VIRTUAL ROUNDTABLE
The rules have changed – defending against third party security risks.
The rules have changed – defending against third party security risks.
Organizations in the region are rapidly progressing their digital transformation strategies at a pace that would have seemed unlikely a year ago. A crucial part of this change is cloud integration with third-party suppliers and digital supply chains, now firmly embedded in organization's IT.
Regrettably, there has been no shortage of supply chain driven incidents, including the widespread SolarWinds attack that has shaken the industry. The Trojan horse advanced persistent threats have disrupted confidence in existing IT security systems, practices and challenge organizations assumed breach mindset.
In response, regulation is changing; for example, the Monetary Authority of Singapore recently announced all financial services and e-payment firms in Singapore must follow more stringent central banking rules. These will impact disclosure, security processes, and practices.
This session will help executives better understand the evolving nature of IT security risks in the region and how their peers are addressing these challenges. We will discuss how the rules of security management are changing. New threats that IT Executives must navigate in the digitized economy. These include zero trust architecture, adopting an assumed breach mindset, and Cloud security.
FORMAT
- This event has been reserved senior IT enterprise executives on a first-come-first-served basis. All registrations are subject to approval
- This session will be held under the Chatham House Rule to encourage open discussion amongst all attendees
- The event will be broken down into presentations, Q&As and open discussions.
- In this event you will be expected to participate and join in with discussions.