Implementing Zero Trust in Your Enterprise

Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn’t work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model – trust nothing, verify everything – sounds straightforward, but it can be a challenge to deploy. In this webinar, learn from the experts what zero-trust looks like in practice, how to create a multi-layered defense, and what challenges to overcome along the way. You will learn the first steps to take toward implementing a zero-trust model in your organization.

On Demand
1h 00min

Attend this webinar and you'll:

  • Formulate a practical checklist of how (and where) to start with implementing zero trust in your organization.
  • Anticipate potential pitfalls with zero-trust deployment and and be able to nimbly sidestep them.
  • Be better equipped to reduce your overall risk and make a big dent in your volume of false-positives.
  • Improve the overall threat posture of your organization as well as its data, applications, and end-users.

Featured Speakers

  • Chris Crowley
    Chris Crowley
    Senior Instructor
    SANS Institute

    Christopher Crowley has 20 years of experience managing and securing networks, beginning with his first job as an Ultrix and VMS systems administrator at 15 years old. Today, Crowley is a Senior Instructor at the SANS Institute and the course author for the culmination of his thoughts on effective cybersecurity operations. He works with a variety of organizations across industries providing cybersecurity technical analysis, developing and publishing research, sharing expert security insights at conferences, and chairing security operations events. He has provided training to thousands of students globally.

  • Tony Goulding
    Tony Goulding
    Cyber Security Evangelist

    Tony Goulding is a cyber security evangelist at Delinea, which delivers Identity-Centric PAM to secure modern enterprises and stop the leading cause of breaches — privileged access abuse. Internally he contributes to product strategy, messaging, competitive intelligence, sales enablement, and go-to-market strategy. Externally, he is an IT security expert and author, speaking at industry events internationally. Educated in the U.K. with a BSc. Honors degree in Mathematics, Mr. Goulding has been part of the global IT security community for more than 30 years. He regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response, and IT security best practices. He is ITIL and CISSP certified.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By