We are creating some awesome events for you. Kindly bear with us.

Making Zero Trust Government a Reality

A Platform For Collaboration

OpenGov Asia is pleased to invite you to an exclusive OpenGovLive! Virtual Breakfast Insight,  aimed at imparting knowledge on how to deploy the zero trust model seamlessly and to overcome common obstacles in zerotrust adoption. 

Accelerating Zero Trust adoption strategies for protecting mission-critical applications and websites for safer, more secure government networks

Singapore has moved from preventing cyber threats to assuming breaches have occurred

                                                  Josephine Teo, Minister for Communications and Information, Singapore  


When Minister Josephine Teo made this statement in Estonia during the Tallinn Digital Summit, she underscored the need to have a strong cybersecurity posture. 

Singaporeans have not forgotten the cyberattack in 2018, where a quarter of the city-state’s population healthcare records were breached during a cyberattack against the country’s healthcare system.  

It was after the 2018 data breach that Singapore’s position on cybersecurity changed from one of trying to prevent attacks to one that assumes that an attack has already occurred. “It’s just a question of ‘when’, it’s not a question of ‘if’,” explained Minister Teo. 

We all know that the pandemic has drastically and unexpectedly accelerated the need for a new network security model. Zero trust security is not a new concept, but it has taken centre stage, and security leaders agree it will improve security and simplify security processes for distributed teams and hybrid networks. 

However, rolling the model out has proven to be complicated, presenting organisations with a mixed bag of successes and obstacles. 

Why Adopting ‘Zero-Trust’ Cybersecurity Posture is the Only Way Forward? 

A widespread move to remote work and the corresponding need for better remote workforce security has spurred investment in zero-trust security.  

The ability to authenticate and monitor all traffic, regardless of its position inside or outside of an organisation’s network, promises to reduce or eliminate many security risks. 

But many organisations find it complicated to implement a zero-trust security approach.  

One key reason is that zero trust adoption is a logistical challenge, not just a technical one. Security modernisation often depends on the progress of user identity consolidation and cloud transformation, both complex and long-term projects. 

What are the Key Obstacles in Zero-Trust Adoption and How to Achieve Integrated Security, Performance, and Reliability? 

Organisations are facing challenges with overall cloud transformation. Organisations have accelerated their cloud adoption plans but are not fully prepared. When large chunks of data have not yet moved to the cloud from isolated data centres, it can become harder to secure using a single security tool. 

Another obstacle proved equally challenging for zero trust adoption: identity and access management (IAM) complexity. Security leaders are struggling to shift to a zero-trust approach due to the complexities of user access needs in their organisation.  

Zero trust relies on a single source of truth for identity management, yet larger organisations, in particular, have often accumulated multiple incompatible identity providers over the years. They must also understand access patterns across a huge number of applications — most of which cannot be shut down even for a moment to be migrated to a new identity platform. 

The pandemic has further exposed the weaknesses of the traditional ‘castle-and-moat’ security model. Remote work has expanded attack surfaces infinitely outwards, and more than ever, agencies need to start from the assumption that their ‘castle’ is already compromised.  

Zero Trust has emerged as a compelling security framework to address the failures of existing perimeter-based security approaches. It’s aspirational, but not unachievable. 

This points to the question – What does it take to adopt and deploy zero trust architecture? Is your organisation equipped to enhance the efficiency and security of your mission-critical applications and websites? 

What can security leaders do to overcome these challenges?  

OpenGov Asia is pleased to invite you to an exclusive OpenGovLive! Virtual Breakfast Insight is aimed at imparting knowledge on how to deploy the zero trust model seamlessly and to overcome common obstacles in zero-trust adoption. 

The session will help delegates understand ways to overcome the barriers to successfully deploy zero trust posture, secure mission-critical applications, websites and IT networks to serve the citizens better. 

We will be discussing:  

Who Should Attend

Meet Our Distinguished Speakers

Gerald (1)

Gerald Caron
CIO & Assistant Inspector General for IT
U.S. Department of Health and Human Services , Office of the Inspector General

Jeffery Brown

Jeffrey Brown
Chief Information Security Officer
State of Connecticut


Mark Huang
Product Director

Fernando Serto crop

Fernando Serto
Chief Technologies and Evangelist - Asia Pacific, Japan, and China

Mohit Sagar
Group Managing Director and Editor-in-Chief
OpenGov Asia

Get the Latest News From OpenGov Asia

OpenGov Asia releases new digital content daily on trending topics within technology and the public sector. Join our newsletter to have weekly digests of our content conveniently sent to your email address.

By submitting, you agree to receive email communications from Opengov Asia, including upcoming promotions and discounted tickets, news, and access to exclusive invite-only events.


brought to you by


Make valuable connections and meet peers and mentors in your industry. Share ideas with others in your field, meet your future business partner, or seek advice from people who’ve done it all before.


We live in uncertain times for tech and business. We’re welcoming the people who are tackling the big challenges facing industry today. In our current climate, upskilling has never been more important.


Get exposed to first-hand knowledge and intelligence from subject matter experts across Asia Pacific to accelerate growth and progress.

“Interesting debate, good to meet other data & IT professionals”

 FWD Singapore

“Well organised event. I have been kept updated about the event. The topics of discussion are relevant to financial institutions today as well as the near future”

Etiqa Insurance

“Well Organised. Good group of participants from across FSIs. Sharing of insights and challenges in transformation of data to drive better customer experiences”

Standard Chartered Bank

Get involved

For sponsorship opportunities

For speaking opportunities



Cloudflare is the security, performance, and reliability company on a mission to help build a better Internet. Today, it runs one of the world’s largest networks that serve over 25 million HTTP requests per second on average, and  with approximately 19% of the Fortune 1000 companies using at least one Cloudflare product.