Zero-Trust In Practice

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model – trust nothing, verify everything – is the proposed answer to this problem. But it’s easier said than done in real enterprise. In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you’ll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

Available:
Thu, Mar 05, 2020 10:00 AM PST / 01:00 PM EST
Duration:
1h 00min

There has been much vendor talk on how their product “solves” Zero Trust (ZT). In reality, a ZT architecture goes beyond “trust no one” and “build micro-perimeters around your data”, and requires organizations define their own framework, policies and practices. As a results, no two ZT implementations are alike. What is consistent though across all ZT implementations is the need for continual monitoring of and adjustments to a ZT posture. At this webinar we will learn what Zero Trust looks like in practice, how to overcome challenges along the way, how to adjust the model over time and simply how to just begin your ZT journey.

Attend this webinar and you'll:

  • Learn the key components of a zero-trust model, and the tools and business processes that can help you get there
  • Get tips on how to build buy-in for zero-trust and enforce it across the enterprise and throughout your supply chain
  • See why better visibility into your users, devices, data and other IT assets is essential to zero-trust -- and how to obtain that visibility
  • Understand the common pitfalls that can foil a zero-trust program, and how to avoid them

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Bassam Khan
    Bassam Khan
    VP of Product and Technical Marketing Engineering
    Gigamon

    Bassam Khan serves as Gigamon Vice President of Product and Technical Marketing Engineering, responsible for positioning and promoting the company’s products and solutions, as well as corporate and go-to-market strategy. Bassam brings a strong track record of more than 20 years managing products and marketing for security, cloud and collaboration technology companies. Prior to Gigamon, he held executive positions at ControlUp, AppSense, PostPath (acquired by Cisco), Cloudmark and Portal Software. Bassam holds degrees from Carnegie-Mellon University and Boston University.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By