Featured Speakers, Panelists &
Moderators
- George Symons, VP of
Strategies | Persistent
- Sundaramurthy,
Sr. Practitioner of Cloud, Infrastructure & Security | Persistent
- Greg Burgdoerfer,
Regional VP | Zscaler
You Are Invited
Ransomware is expected to cause $42 billion in damages by
the end of 2024 and Healthcare &
Life Sciences and Banking & Financial are the most targeted industry in 2023
and 2024. An attack hits every 14 seconds worldwide
putting every organization at risk,
with escalating scope and volume. What is worse, roughly 50%
of ransomware attacks now
include attempts to steal data.
As per one Gartner report, by 2025, 60% of companies will
use Zero Trust solutions instead of
virtual private networks, emphasizing "never trust, always
verify". This year, we'll see even
more significant growth in adopting Zero Trust solutions.
One of the key predictions for the
future is that hackers will target areas not covered by Zero
Trust.
Zero Trust is a foundational strategy that maximizes an
organization's chances of mitigating the
damage a ransomware attack might cause. Zero trust is based
on the principle of least-privilege
access and the idea that no user or application should be
trusted inherently. Sounds simple right?
But what does zero trust truly mean, and how can HCLS
companies ensure its proper
implementation?
In this roundtable, we will
be discussing the challenges and success in AI, Cyber
Security Strategies and implementing
zero trust
led by experts George
Symons, VP of Cloud,
Infrastructure, and Security at Persistent Systems
lead a discussion in accelerating the digital transformation while preventing
breaches and
data loss - all without disrupting user experience and
productivity.
Subject Matter Topic & Key
Takeaways:
- The ins and outs of
AI, Cyber Security, Ransomware Defense, zero trust and more
- What sets
Zero Trust Exchange apart from legacy architectures
- The network impacts
from implementing Zero Trust, both within and outside
the
corporate/cloud infrastructure
- How you can enhance
security for cloud workloads & zero trust security
6:00 PM - 8:00 PM (Local Time)
Attendees Schedule
6:00pm - Guests Arrive and Peers Networking
6:40pm - Welcome, Introductions & Dinner is Served
7:00pm - Industry Update & Knowledge Sharing
7:45pm - Dessert & Peers Roundtable
8:00pm - Closing & More Networking