About the Boardroom

Have you wondered how some of the largest utility enterprises are embarking on their journey towards achieving zero-trust for the siloed IT/OT environment, the increasingly vulnerable devices in the network, and the upcoming explosion with IoT?

IoT is revolutionizing every part of the utility sector ecosystem. It not only enhances the generation, transmission, and distribution of power but also impacts how companies interact with customers, partners, and service providers. The rapid digital transformation, and adoption of smart grids and other smart devices, demands a robust security approach.

Zero-trust security approach entails verifying identities of people and things, before establishing trust. As such, digital identities form the basis of this approach to security. It is straight forward from a conceptual point of view: every user or device needs a trusted identity. This makes zero-trust security approach best suited for an IoT-enabled, hyper-connected infrastructure.

However, reality complicates theory.

Grids have a greater reach, connect to more devices, partners, and customers to provide power, and share data, thus creating a larger attack surface. While smart meters are relatively new, other components of the smart grid still rely on legacy systems. This old-meets-new paradigm is also true for internal, corporate networks. Corporate offices are situated at multiple locations, each often with a different identity and access management system, and enterprise devices management system.

Join us for an exclusive roundtable discussion to discover successful strategies for achieving zero-trust security. Guided by insights from industry thought leaders, the discussion will draw from experience of the attendees, offering new insights towards securing critical infrastructure.

Benefits of Attending

  • Understanding Zero-trust security architecture, its benefits, and challenges
  • Learn from the experiences of your peers and industry thought leaders
  • Emerge with new strategies and solutions that you can immediately put to work


Time Activity
12:00 pm Welcome remarks from GM Group and housekeeping
12:05 Welcome and opening remarks
12:15 Open discussion:

  • Where do you stand in your journey towards achieving zero-trust?
  • What are the common challenges with the current security landscape that hinder adoption of a zero-trust security model and recommendations?
  • The role of trusted identities in a zero-trust strategy
  • How some of the largest, global utility enterprises have started adoption of the zero-trust architecture
13:10 Summarize discussion and key takeaways
13:20 Closing remarks


Daniel Hjort

Director of Marketing and Business Development – Global, Nexus Group

Daniel Hjort is the global Director of Marketing and Business Development at Nexus Group. He is an identity industry expert with over 20 years of experience working with PKI-based identity solutions. Daniel has a great track record of creating growth through the innovation of products, initiatives, and brands. He has wide experience in directing teams around Product Management, Business Development & Product Marketing. He joined Nexus in March 2016, leaving his position as director of business development of ID solutions at TietoEVRY, one of the leading IT companies in the Nordic region. Hjort has previously worked for international enterprises such as Gemalto and the ASSA ABLOY subsidiary HID Global.

Tejas Lagad

Director – Asia, Nexus Group

Tejas Lagad is the Director for Asia, Middle East, and Africa at Nexus Group. He has region-wide responsibility for revenues and profitability and ensuring the greatest leverage from Nexus products and services business. With 20 years of experience that spans across Product Management, Software Engineering, Consulting and Sales, Tejas is focused on making Nexus the most admired security company. Prior to this assignment, Tejas held a variety of successful technical and leadership positions in Symantec, Novell and HCL. Tejas holds a bachelor’s degree in Electrical Engineering from Mumbai University, a master’s degree in Software Systems from the BITS Pilani, and Advanced Programme in Strategic Management from IIM Calcutta.

Lloyd Rodrigues

Regional Head & Product Manager – Middle East & Africa, Nexus Group

Lloyd Rodrigues is the Regional Head and Product Manager for Middle East and Africa at Nexus Group. He has region-wide responsibility for Business Development, Account and Product Management on the Nexus Smart ID product suite. Lloyd comes with an expertise in creating and evangelizing the Nexus Smart ID product offering along with the appropriate go to market strategy and directing multi-channel customer engagement roadmaps. He is a self-starter with the ability to re-apply extensive experience gained over the past 12+ years, from demanding projects across different domains and geographies.

Jayadevan K

President – Cyberton Global DMCC, Dubai

Jay is a long timer in in the IT Security field – having been in the middle east for more than 23 years – of which 16 years is spend in security addressing large organisations across the region into various verticals. He currently heads up Cyberton, a prominent Value-Added Distributor for MENA addressing Cyber Security for enterprise customers. Cyberton represents several vendors carrying cutting-edge solutions in Deception, SOAR, DLeP, Attack Surface Visibility, Network Attack Discovery, WAF, Vulnerability Management, PAM and others. Prior to Cyberton, he was Sr. Vice President of ComGuard, a Dubai based IT Security VAD, responsible for building their enterprise focus, and building channel for vendors such as ArcSight (HP), WachGuard, Landesk (Ivanti), Nexthink, IXIA, Gemalto, BeyondTrust, BlueCAT Networks, Mojo Networks and several others. Later he functioned as a Board Member of SpectrumGroup of which ComGuard was a part. In all he carries several decades of experience commencing his IT career at Computer Point India Limited and later with Microland Limited, Mindware SA, in various positions.

Who Will Attend

Senior executives from Power and Utility Companies:

  • CIOs
  • CDOs
  • Chief Innovation Officers
  • Chief Transformation Officers

About Checkpoint

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes. For more information, please visit www.checkpoint.com


    Please note that by registering to attend this virtual executive boardroom / conference you acknowledge and agree that the partners of the event can contact you with the contact information you have provided.