ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Zero Trust

February 02-03, 2021

Register Now

WELCOME / Summit Overview

With many enterprises now employing at least some degree of a full-time remote workforce, more than ever security leaders need to know exactly who is logging into critical systems and accessing role-appropriate data. This is the mission of zero trust. Not a product nor a service, zero trust is a strategy that employs multifactor authentication, biometric and behavioral analytics and continuous monitoring to verify user identities and control access to sensitive resources.

Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the myths and realities about zero trust, the emerging guidelines and standards, and how zero trust is being deployed successfully.

Details

Free Registration

February 2-3  @ 9:00 am EST

Register

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

John Kindervag

Creator of Zero Trust & Field CTO, Palo Alto Networks

Eugene Liderman

Director of Mobile Security Strategy, Google

Rohit Ghai

President, RSA

Sam Curry

Chief Security Officer, Cybereason

Tom Field

SVP - Editorial, ISMG

Michael Chertoff

Executive Chairman, The Chertoff Group

Gen. Keith Alexander (retired)

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

SPEAKERS / Featured Zero Trust Speakers

Sujeet Bambawale

CISO, 7-11

Togai Andrews

CISO, Bureau of Engraving and Printing

Katie Arrington

CISO, Department of Defense

Henk van Achterberg

Technical Architect for Zero Trust, Symantec Enterprise Division | Broadcom

Chase Cunningham

Principle Analyst, Forrester

Dave Lewis

Global Advisory CISO, Cisco

Ax Sharma

Senior Security Researcher, Sonatype,

Martyn Crew

Director of Solutions Marketing, Gigamon

Grant Schneider

Senior Director For Cybersecurity Services, Venable LLP

Rocco Grillo

Managing Director, Global Cyber Risk & Incident Response Services Alvarez & Marsal

Kostas Georgakopoulos

Global CISO, Proctor & Gamble, P&G

Jeffrey Brown

CISO, State of Connecticut

Michael Thelander

Director of Product Strategies, Venafi

Rich Thompson

VP, Global Sales Engineering, BlackBerry

Shehzad Merchant

Chief Technology Officer, Gigamon

Christopher Perry

Lead Product Manager, BMC

Agenda / Session Date & Times (ET)



  • Tuesday, February 2nd

  • Wednesday, February 3rd

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

Katie Arrington, CISO, Department of Defense

Speaker:
Katie Arrington, CISO, Department of Defense

10:00 am -
10:30 am
10:00 am - 10:30 am

2021 and beyond: Dealing with reality, hype, and truth in ZT

Speaker:
Chase Cunningham, Principle Analyst, Forrester

Even without the current forces of change, the world would be adopting zero-trust principles, but cyber security professionals still want to know why is the adoption of ZT happening? In this session Dr. Chase Cunningham details what the real issues are and how an organization should deal with the truths that are so evident in cyber security. Chase will talk about how the U.S. Army, FBI, major banks and many more are deep into a long-term transformation to enable Zero Trust, the technologies that make sense in this space, and he will provide insights into how ZT is being approached from the architecture and policy perspective. In this talk you'll also receive two simple questions to ask a zero-trust vendor who claims to address these fundamental issues and to find out whether they offer legitimate technology, or whether they, too, deserve Zero Trust

10:30 am -
11:00 am
10:30 am - 11:00 am Track A

Securing your entire enterprise with a holistic Zero Trust strategy

Speaker:
Henk van Achterberg, Technical Architect for Zero Trust, Symantec Enterprise Division | Broadcom

In this session we will take a closer look at zero trust and explain why zero trust is everywhere, in the cloud and on-premise including the mainframe. A holistic data-centric zero trust approach will keep your data safe, enable digital transformation and allow enterprises to be cost efficient when choosing the right zero trust platform.

10:30 am - 11:00 am Track B

Machines by the Millions: The Zero Trust Challenge You May Not Know About Yet

Speakers:
David Brancato, Director of Technical Marketing, Venafi
Michael Thelander, Director of Product Strategies, Venafi

Think you know Zero Trust? You might have just half the story. In the new normal, Zero Trust is a part of your enterprise strategy. It's about secure remote access for your employees and partners. It's the model built on BeyondCorp. But, you've perhaps got just half the story.

Beyond remote access, beyond people, and beyond the traditional datacenter is the BeyondProd model. This is the machine-driven Zero Trust you may not know about yet: a fast-moving world of a perimeter-less, identity-based systems that rely on cloud-native designs, microservices, and service meshes that your developers and architects are driving today. You need to know how to secure and protect the millions of machine identities that are on the other side -- the non-human side -- of Zero Trust.

11:00 am -
11:15 am
11:00 am - 11:15 am Track A

Christopher Perry, Lead Product Manager, BMC

Speaker:
Christopher Perry, Lead Product Manager, BMC

Christopher Perry is the Lead Product Manager for BMC AMI Security. Prior to BMC, he served in the US Army in several cyber security roles including Expeditionary Cyber Company Commander, Technical Advisor to the Commanding General of Army Cyber Command, and Cyber Training Officer. He is a graduate of United States Military Academy and holds several certifications including Offensive Security Certified Professional + Expert (OSCP / OSCE), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Penetration Tester (GPEN), GIAC Certified Intrusion Analyst (GCIA), and GIAC Certified Forensic Analyst (GCFA).
11:00 am - 11:15 am Track B

Tech Spotlight

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

Christopher Perry, Lead Product Manager, BMC

Speaker:
Christopher Perry, Lead Product Manager, BMC

Christopher Perry is the Lead Product Manager for BMC AMI Security. Prior to BMC, he served in the US Army in several cyber security roles including Expeditionary Cyber Company Commander, Technical Advisor to the Commanding General of Army Cyber Command, and Cyber Training Officer. He is a graduate of United States Military Academy and holds several certifications including Offensive Security Certified Professional + Expert (OSCP / OSCE), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Penetration Tester (GPEN), GIAC Certified Intrusion Analyst (GCIA), and GIAC Certified Forensic Analyst (GCFA).
11:15 am - 11:45 am Track B

Starting with Zero...Trust

Speaker:
Rich Thompson, VP, Global Sales Engineering, BlackBerry

When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is important? What about IoT? What role does our current security program play?

This session will explore the important questions about whether Zero Trust should be a priority for your organization and touches on the role of users and devices, environment and network. We will discuss the approaches and challenges with Zero Trust, addressing business drivers such as cloud environments and business continuity needs.

11:45 am -
12:15 pm
11:45 am - 12:15 pm

Why network visibility is critical to getting Zero Trust right?

Speakers:
Shehzad Merchant , Chief Technology Officer, Gigamon
Sujeet Bambawale, CISO, 7-11
Togai Andrews, CISO, Bureau of Engraving and Printing

  • Zero Trust is about implementing the right policies for ZT access. How do you get the policies right so that they are tight enough to be meaningful and yet not break the network?
  • Once Zero Trust policies are implemented, how do you monitor for moves/adds/changes so that the policies are can adjusted based on changing application, network and user patterns
  • Zero Trust won't prevent breaches, though it will make it harder and help contain the impact. What do you need to do beyond ZT to actively monitor for threat activity?
12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Break: Networking and Exhibition

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm Track A

Zero Trust Access: The Five Step Program

Speaker:
Dave Lewis, Global Advisory CISO, Cisco

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers security without cumbersome and antiquated technologies. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.
12:30 pm - 1:00 pm Track B

Rise of Next-Gen Software Supply Chain Attacks

Speaker:
Ax Sharma, Senior Security Researcher, Sonatype

Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability disclosures. Instead, they are actively injecting malicious code into open source projects that feed the global supply chain.

Join in this session led by Ax Sharma, Senior Security Researcher, Sonatype to:

  • Understand software supply chain attacks and their impact on the open-source ecosystem
  • Deep dive into prominent real-world examples of typosquatting and brandjacking malware
  • Learn how your organization can proactively protect itself against software supply chain attacks
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

Grant Schneider, Senior Director For Cybersecurity Services, Venable LLP

Speaker:
Grant Schneider, Senior Director For Cybersecurity Services, Venable LLP

1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

The CISO's View: Zero Trust in Action

Speakers:
Jeffrey Brown, CISO, State of Connecticut
Kostas Georgakopoulos, Global CISO, Proctor & Gamble
Rocco Grillo, Managing Director, Global Cyber Risk & Incident Response Services Alvarez & Marsal

Enterprise cybersecurity changed over a weekend last March - and so did the conversation about zero trust security. No longer a marketing buzz phrase, zero trust now represents the practical approach to validating credentials of employees, partners and trusted third parties. We've shifted from "trust, but verify" to "verify, then trust."

In this session, three experienced security leaders will weigh in on:

  • How they have deployed zero trust
  • Governance, culture and technology challenges to overcome
  • Zero trust's impact on the future of third-party and supply chain risk
2:00 pm -
5:00 pm
2:00 pm - 5:00 pm

On Demand Viewing

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:30 am -
10:00 am
9:30 am - 10:00 am

Registration & Exhibit Browsing

10:00 am -
10:30 am
10:00 am - 10:30 am

Using Zero Trust for Fast Implementation of Secure Remote Access AND VPN Load Reduction

Speaker:
Michael Dubinsky, Head of Product Mgmt. - Zero Trust, Information Security Group, Symantec

In today's circumstances remote work is up by over 100%, demanding our security and infrastructure capabilities to overnight adapt to this change. Moreover, this requirement would not pass overnight and will impact us in the upcoming months, if not longer. In this session I will describe how cloud based solution, which are built based on the model of Zero Trust can help your infrastructure adapt quickly to this new 'remote' norm as well as drive increased security of your business.
10:30 am -
11:00 am
10:30 am - 11:00 am

Implementing Zero Trust: a Practical Blueprint

Speaker:
Ashish Malpani, Sr. Director Product Marketing, Forcepoint

Implementing 100% Zero Trust cybersecurity infrastructure is a daunting task and various factors pose a challenge in the adoption. Transition to a Zero Trust cybersecurity architecture is not a one size fits all approach. This session provides a practical approach to adopting Zero Trust while outlining the strategy, possibilities for leveraging existing investments, and the need for new investments.
11:00 am -
11:30 am
11:00 am - 11:30 am

Tech Spotlight: Menlo Security

Speaker:
James Locus, Sr. Manager, Product Marketing, Menlo Security

11:30 am -
12:00 pm
11:30 am - 12:00 pm

Panel: Zero Trust in Action - Practical Deployments

Speakers:
Bobby Singh, CISO & CTO, TMX Group
Chris Frenz, CISO, Interfaith Medical Center
Gary Hayslip, Director of Information Security, SoftBank Investment Advisers
Mark Ostrowski, Head of Engineering for the East, US, Check Point
Tom Field, Senior Vice President, Editorial, ISMG

Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. Hear actual case studies from CISOs discussing:

  • Use cases for zero trust;
  • Challenges to expect;
  • Metrics of success.
12:00 pm -
5:00 pm
12:00 pm - 5:00 pm

OnDemand Session Viewing Available

View Schedule

SPONSORS / Supporting Organizations

Blackberry
Broadcom
Check Point
Cisco Systems
Gigamon
Sonatype
Venafi

VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.

Speakers featured Zero Trust presenters

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data