Zero-Trust in Real Life

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model – trust nothing, verify everything – is the proposed answer to this problem. But it’s easier said than done in real enterprise. At this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you’ll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn how organizations are deploying the zero-trust model
  • Find out what zero-trust really looks like in actual implementations
  • Gain insights on common challenges with ZT and how to overcome them
  • Get advice for how to immediately begin to take the first steps toward zero-trust in your organization

Featured Speakers

  • Stacey Halota
    Stacey Halota
    Vice President-Information Security and Privacy
    Graham Holdings Company

    Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. Graham Holdings is a diversified education and media company whose operations include educational services, television broadcasting, online, print and local TV news, home health and hospice care, manufacturing, car dealerships and restaurants. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance and other data protection efforts. Stacey has more than 25 years of experience in the information technology, security and privacy field. Before joining Graham Holdings, she served as the federal government and southeast region leader of Guardent (now part of Verisign), a security and privacy consulting and managed security services company. Prior to Guardent, she worked at PricewaterhouseCoopers in the Technology Risk Services consulting practice working with federal government and Fortune 500 clients. Stacey is a past recipient of Secure Computing Magazine’s Chief Security Officer of the Year award and was also named Mid-Atlantic Information Security Executive of the Year (Commercial Category) by the Executive Alliance. She is a Certified Information Systems Security Professional (CISSP), and a Certified Information Privacy Professional (CIPP). Stacey is a frequent speaker on information security and privacy topics and is on the strategic advisory boards of CyberVista and Y/L Ventures.

  • David Treece
    David Treece
    Director, Solutions Architecture
    Yubico

    David is a director of solutions architecture at Yubico focused on architecting strong, easy to use and manage authentication solutions for the enterprise. David has worked with the FIDO Alliance to define implementation patterns for the FIDO standards. He has over 20 years experience architecting and implementing Identity and Access Management systems for enterprises in the retail, manufacturing, IT and services industries. David has a Masters of Science degree in Business Administration focused on Information Systems from San Diego State University.

  • Terry Sweeney
    Terry Sweeney
    Moderator
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sponsored By