
9:00 am - 9:30 am

Registration & Exhibit Browsing

With many enterprises now employing at least some degree of a full-time remote workforce, more than ever security leaders need to know exactly who is logging into critical systems and accessing role-appropriate data. This is the mission of zero trust. Not a product nor a service, zero trust is a strategy that employs multifactor authentication, biometric and behavioral analytics and continuous monitoring to verify user identities and control access to sensitive resources.
Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the myths and realities about zero trust, the emerging guidelines and standards, and how zero trust is being deployed successfully.
February 2-3 @ 9:00 am EST
Registering For a Group?
Call + 1 (609)-356-1499
Speaker:
Chase Cunningham, Principle Analyst, Forrester
Even without the current forces of change, the world would be adopting zero-trust principles, but cyber security professionals still want to know why is the adoption of ZT happening? In this session Dr. Chase Cunningham details what the real issues are and how an organization should deal with the truths that are so evident in cyber security. Chase will talk about how the U.S. Army, FBI, major banks and many more are deep into a long-term transformation to enable Zero Trust, the technologies that make sense in this space, and he will provide insights into how ZT is being approached from the architecture and policy perspective. In this talk you'll also receive two simple questions to ask a zero-trust vendor who claims to address these fundamental issues and to find out whether they offer legitimate technology, or whether they, too, deserve Zero Trust
Speaker:
Henk van Achterberg, Technical Architect for Zero Trust, Symantec Enterprise Division | Broadcom
In this session we will take a closer look at zero trust and explain why zero trust is everywhere, in the cloud and on-premise including the mainframe. A holistic data-centric zero trust approach will keep your data safe, enable digital transformation and allow enterprises to be cost efficient when choosing the right zero trust platform.
Speakers:
David Brancato, Director of Technical Marketing, VenafiMichael Thelander, Director of Product Strategies, Venafi
Think you know Zero Trust? You might have just half the story. In the new normal, Zero Trust is a part of your enterprise strategy. It's about secure remote access for your employees and partners. It's the model built on BeyondCorp. But, you've perhaps got just half the story.
Beyond remote access, beyond people, and beyond the traditional datacenter is the BeyondProd model. This is the machine-driven Zero Trust you may not know about yet: a fast-moving world of a perimeter-less, identity-based systems that rely on cloud-native designs, microservices, and service meshes that your developers and architects are driving today. You need to know how to secure and protect the millions of machine identities that are on the other side -- the non-human side -- of Zero Trust.
Speaker:
Christopher Perry, Lead Product Manager, BMC
Speaker:
Christopher Perry, Lead Product Manager, BMC
Speaker:
Rich Thompson, VP, Global Sales Engineering, BlackBerry
When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is important? What about IoT? What role does our current security program play?
This session will explore the important questions about whether Zero Trust should be a priority for your organization and touches on the role of users and devices, environment and network. We will discuss the approaches and challenges with Zero Trust, addressing business drivers such as cloud environments and business continuity needs.
Speakers:
Shehzad Merchant , Chief Technology Officer, GigamonSujeet Bambawale, CISO, 7-11Togai Andrews, CISO, Bureau of Engraving and Printing
Speaker:
Dave Lewis, Global Advisory CISO, Cisco
Speaker:
Ax Sharma, Senior Security Researcher, Sonatype
Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability disclosures. Instead, they are actively injecting malicious code into open source projects that feed the global supply chain.
Join in this session led by Ax Sharma, Senior Security Researcher, Sonatype to:
Speakers:
Jeffrey Brown, CISO, State of ConnecticutKostas Georgakopoulos, Global CISO, Proctor & GambleRocco Grillo, Managing Director, Global Cyber Risk & Incident Response Services Alvarez & Marsal
Enterprise cybersecurity changed over a weekend last March - and so did the conversation about zero trust security. No longer a marketing buzz phrase, zero trust now represents the practical approach to validating credentials of employees, partners and trusted third parties. We've shifted from "trust, but verify" to "verify, then trust."
In this session, three experienced security leaders will weigh in on:
Speaker:
Michael Dubinsky, Head of Product Mgmt. - Zero Trust, Information Security Group, Symantec
Speaker:
Ashish Malpani, Sr. Director Product Marketing, Forcepoint
Speakers:
Bobby Singh, CISO & CTO, TMX GroupChris Frenz, CISO, Interfaith Medical CenterGary Hayslip, Director of Information Security, SoftBank Investment AdvisersMark Ostrowski, Head of Engineering for the East, US, Check PointTom Field, Senior Vice President, Editorial, ISMG
Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. Hear actual case studies from CISOs discussing:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com