The concept of workplace has changed forever. Remote working at-scale is expected to last. With endpoints residing outside the network perimeters and attack surfaces having grown exponentially, risks have been amplified and incidents are inevitable.
To better strengthen endpoint security, streamline control and prevent data leakage, CISOs are implementing unified endpoint management, endpoint detection and response (EDR), and mobile management tools while rethinking remote access policies.
Aiming for timely detection, swift response, and business continuity, security professionals are exploring the latest countermeasures, with focuses on security orchestration, automation and response (SOAR), user and entity behavior analytics (UEBA), and resiliency.
Organizations with large attack surfaces are implementing Zero Trust Architecture (ZTA) to better secure their most valuable data, assets, applications and services (DAAS) with micro-segmentation, repeated verification, and layered access.
Questex Asia’s Total Security Conference 2021 in Singapore on 25 Nov will serve as the ideal platform for CISOs, heads of IT, heads of security and regulators to explore strategies and tactics in an enlarged, complicated, and evolving security landscape.
Key topics discussed in 2021 to enhance your security strategies:
- Safeguarding endpoints and attack surface efficiently
- Analyzing user behaviors to distinguish evasive attacks
- Orchestrating security eco-system from multiple technology tools for improved defense efficiency
- Automating detection and response to combat increasingly complexed and speedy attacks
- Enhancing DAAS protection by adopting Zero Trust Architecture
- Integrating security and IT operations to increase efficiency
- Ensuring resiliency through establishing recovery and response plans
Who Should Attend
To ensure the conference offers the highest degree of relevancy, only C-Level, Senior Executives and IT professionals from corporate, public and government agencies are invited to attend.
This exclusive format allows delegates to connect with those peers whose insights they respect the most – through exceptional networking, business meetings and strategic information-sharing sessions.
Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:
- Chief Information Security Officer
- Head / Director / VP – IT Security
- Head / Director / VP – Technology Risk
- Head / Director / VP – Business Continuity Management
- Head / Director / VP – IT Security & Assurance
- Head / Director / VP – Information Security Risk
- Head – Technical Architecture
- Lead – Technical Architecture