We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.
This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.
When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.
Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.
If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.
09:00 – 09:20: Registration and Welcome
09:20 – 10:00: Help AG: Zero Trust, what is it and where can you start
In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.
10:00 – 10:40: Symantec: Data Protection On-Premises and in the Cloud
Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.
10:40 – 11:20: Fortinet: The Zero Trust Enforcement Point
The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.
11:20 – 12:00: Coffee break and refreshments
12:00 – 12.40: Infoblox: How Secure DNS is a clear element of Zero Trust
One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.
In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.
12:40 – 13:20: Pulse Secure: Identity, the Foundation of Zero Trust
Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership. Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!
13:20 – 14:00: Skybox Security: Zero Trust Starts with Visibility
Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.
In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.
(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.)
Back to Top