Brief Agenda

ZTS & Identity Forum

8 May, 2025

08:00

09:00

In this 10-minute networking session, the goal is to connect with three new people. Let the questions onthescreenspark your conversation. Enjoy the opportunity to expand your network!

09:00

09:10

10:10

09:10 – 10:10

  • What is the current state of fraud & security across industries?
  • What are the top risks that organizations across sectors are facing today?
  • How are threat vectors changing and adapting over time? How security professionals are preparing for the next generation of cyberattacks?
  • What emerging technologies are having the biggest impact on security across industries?
  • Biggest obstacles in securing sensitive data across hybrid and multi-cloud environments?
  • Key lessons from recent high-profile security breaches.  How does adopting a “Never Trust, Always Verify” approach mitigate emerging threats?
  • How does Zero Trust Security address the inadequacies of traditional cybersecurity models?
  • Role of micro-segmentation in limiting the lateral movement of attackers.  Foundational principles of Zero Trust that industries should focus on.  Why is Identity and Access Management crucial in the Zero Trust framework?
  • Importance of real-time monitoring in Zero Trust adoption.  How are industries like banking, healthcare, and retail tailoring Zero Trust to their needs?
  • Challenges do legacy systems pose to Zero Trust implementation?
  • How does AI and ML enhance Zero Trust implementations.  How can organizations measure the ROI of Zero Trust adoption effectively?
  • Will Zero Trust Security become a regulatory requirement across industries?
  • What does the next decade of Zero Trust Security look like?

10:00

10:10

10:35

10:10 – 10:35

  • Why is identity considered the foundation of Zero Trust architecture?
  • How does continuous trust assessment enhance security in real-time?
  • Key steps for transitioning to an identity-first security model?
  • How does Zero Trust strengthen security in multi-cloud environments?
  • What role does adaptive authentication play in mitigating insider threats?
  • How can organizations effectively implement “never trust, always verify” across all endpoints?

10:35

11:00

10:35 – 11:00

  • Why is Zero Trust critical for banks in the current threat landscape
  • How does IAM and MFA contribute to a Zero Trust model
  • How is AI enhancing the predictive capabilities of Zero Trust security?
  • Challenges in integrating AI & ML into a Zero Trust framework.  What tools and technologies are essential for implementing ZTS in banking.  What emerging cyber threats should banks prepare for in the future?

11:00

11:00

11:30

  • Is Zero Trust the future of securing sensitive data across industries like insurance and healthcare?
  • What’s the real impact of Zero Trust on protecting data?
  • How does this model help mitigate threats that target crucial information?
  • Is IAM essential for securing systems in organizations handling sensitive records?
  • What role does micro-segmentation play in enhancing security across diverse networks?
  • Can continuous verification redefine how financial and medical transactions are secured?
  • How does Zero Trust improve collaboration with third-party vendors like service providers and partners?
  • What are the opportunities for AI and automation in scaling Zero Trust for across industries.
  • What challenges do organizations face when modernizing legacy systems to align with Zero Trust principles?
  • How does Zero Trust address privacy concerns while adhering to strict regulations?
  • Is real-time monitoring enough to detect fraud and cyberattacks.
  • How does least-privilege access reduce risks in systems that deal with financial or medical records?
  • What metrics best reflect the success of Zero Trust implementation in data-intensive organizations?
  • Can technologies like blockchain strengthen trust and security frameworks?
  • How does this approach streamline access management for high-stakes environments?
  • If there’s one takeaway for adopting Zero Trust, what should it be?
  • How can this model accelerate secure operations without compromising user experience?
  • What strategies can ensure resilience against cyberattacks targeting financial and healthcare systems?
  • What future trends could shape Zero Trust adoption in safeguarding critical infrastructure?
  • How does Zero Trust prepare organizations for new, AI-driven cybersecurity challenges?

11:00 – 11:30

12:00

12:20

In this keynote, we will explore how Zero Trust is transforming the insurance industry. With growing cyber threatsanddigital transformation challenges, insurers are adopting Zero Trust to protect sensitive data, meet compliancestandards, and prevent fraud. We’ll focus on core Zero Trust principles—continuous verification, least privilegeaccess,micro-segmentation, and real-time monitoring—and how they are reshaping security in the insurance sector.

12:00 – 12:20

12:20

13:00

This a 30 mins International Demo Contest which will follow a dynamic “Dragon’s Den” style format, Herewewill showcase five shortlisted Techs which are making a big impact in the security space. No PPTs, No Videos, PurePitch!Let’s witness their cutting edge solutions about one of their star products that are making a big impact.

12:20 – 13:00

14:00

14:00

14:40

14:00 – 14:40

  • How does a security-first approach protect critical sectors like telecom, energy, and healthcare?
  • What impact do modern cyber threats have on industries like telecom and energy?
  • Why is adopting a robust security framework so crucial for sectors undergoing DX?
  • Challenges do these industries face when securing legacy systems?
  • How does Zero Trust help prevent DDoS attacks and insider threats in telecom and energy?
  • What role do 5G and IoT play in Zero Trust adoption across these industries?
  • How can secure operational technology networks be protected in energy, and what shared risks dotelecomandhealthcare face?
  • Why is least privilege access so critical for cloud and IoT security in these sectors?
  • What regulatory hurdles do critical sectors face when implementing comprehensive security measures? How does behavioral analytics enhance SCADA system security in telecom and energy?
  • How can automation help scale security measures across these industries?
  • How might quantum computing impact cybersecurity in critical sectors?
  • What’s next for safeguarding sensitive data across interconnected industries?
  • How do these sectors rely on each other, and what shared security challenges do they face?
  • How are the approaches to Zero Trust different across these industries, and how can we align themfor betterprotection?

14:40

15:00

14:40 – 15:00

  • How does Zero Trust enhance cloud security in the face of evolving threats?
  • What role does data encryption play in maintaining data sovereignty
  • Best practices for balancing security with regulatory requirements in cloud environments?
  • How does Zero Trust address emerging threats in cloud-native applications?
  • Key challenges in ensuring data sovereignty within a Zero Trust model?
  • What technologies are accelerating the adoption of Zero Trust for data protection in the cloud?

15:00

15:00

15:30

Join us for an insightful fire-side chat on the evolving threat landscape and the role of Zero Trust Security insafeguarding organizations. We’ll explore how technologies like AI, automation, and real-time monitoringaretransforming threat detection and response, while ensuring compliance with regulations like GDPRand CCPA. Theconversation will also highlight the challenges of securing remote work environments and the importanceof identityand access management (IAM) in building a cyber-resilient future.

  • Moderator

    TBC

  • Senior Executives

    TBC

    Panel Sponsor

15:00 – 15:30

15:30

15:50

15:30 – 15:50

  • How can organizations ensure every user and device is authenticated and authorized in real time?
  • Key benefits of integrating behavioral analytics into a Zero Trust model?
  • How can Zero Trust frameworks adapt to emerging threats like ransomware and insider attacks?
  • Role does endpoint security play in strengthening Zero Trust implementations?
  • How does Zero Trust enable seamless integration with cloud and multi-cloud environments?
  • Best practices for securing sensitive data within Zero Trust architecture?
  • How do continuous monitoring and AI-driven insights enhance decision-making in Zero Trust environments?

15:50

16:30

15:50 – 16:30

  • How can Zero Trust and micro-segmentation help overcome these challenges?
  • How can insights from each industry help address the shared risks in telecom, energy, and healthcare? What regulatory hurdles do these sectors face, and how can they be solved?
  • How can automation improve security across these industries?
  • What role does IAM play in controlling access to critical systems?
  • How can Zero Trust prevent fraud and multi-channel cyberattacks in these sectors?
  • In what ways these industries manage third-party risks in their supply chains?
  • How can Zero Trust help comply with global security regulations?
  • How can organizations prepare for cybersecurity challenges in the quantum era?
  • Does Zero Trust help protect critical systems like ATMs, POS, and travel kiosks, and how?
  • How do Zero Trust and cloud security work together to protect these industries?

16:00

16:30

17:10

  • How are cloud-native security architectures improving flexibility and risk management?
  • Role do CASBs play in securing SaaS apps and cloud data?
  • How are AI and ML transforming threat detection and response?
  • How is adaptive authentication reshaping MFA for the future?
  • Can zero-knowledge proofs and blockchain strengthen IAM?
  • What’s driving the shift toward passwordless and biometric authentication?
  • How will FIDO2 and WebAuthn change cross-device authentication?
  • Impact will quantum computing have on cryptographic security?
  • How will 5G affect cloud and remote security strategies?
  • What role does automation play in creating scalable security frameworks?
  • Emerging cyber threats should we prepare for by 2030?
  • How does ZTNA protect against threats like ransomware and supply chain attacks?
  • How can organizations balance cloud security and compliance in changing regulations?
  • Key zero-trust trends should we watch for in the future?

16:30 – 17:10

17:10

17:20

17:20

18:00

17:20 – 18:00

    FILL THE FORM FOR SPONSORSHIP PACKAGES


    [anr_nocaptcha g-recaptcha-response]