ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Zero Trust

April 21, 2020

WELCOME / Summit Overview

With many enterprises now employing a 100% remote workforce, more than ever security leaders need to know exactly who is logging into critical systems and accessing role-appropriate data. This is the role of zero trust. Not a product or a service, zero trust is a strategy that employs multifactor authentication, biometric and behavioral analytics and continuous monitoring to verify user identities and control access to sensitive resources.

Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the myths and realities about zero trust and how it is being deployed successfully.

Details

Free Registration

April 21st @ 10:00 am EDT

Additional Times:

April 22nd @ 12:00 pm EDT

April 23rd @ 2:00 pm EDT

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

John Kindervag

Creator of Zero Trust & Field CTO, Palo Alto Networks

Eugene Liderman

Director of Mobile Security Strategy, Google

Rohit Ghai

President, RSA

Sam Curry

Chief Security Officer, Cybereason

Tom Field

SVP - Editorial, ISMG

Michael Chertoff

Executive Chairman, The Chertoff Group

Gen. Keith Alexander (retired)

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

SPEAKERS / Featured Zero Trust Speakers

Ron Ross

Fellow, National Institute of Standards and Technology (NIST)

Bobby Singh

CISO & CTO, TMX Group

Chris Frenz

CISO, Interfaith Medical Center

Nick Holland

Director, Banking and Payments, ISMG

David McNeely

Chief Strategy Officer, Centrify

Tom Field

Senior Vice President, Editorial, ISMG

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Steve King

Director, Cybersecurity Advisory Services, Information Security Media Group

Jack Koons

Chief Cybersecurity Strategist, Unisys

Gary Hayslip

Director of Information Security, SoftBank Investment Advisers

John Kindervag

Field CTO, Palo Alto Networks

Dylan DeAnda

VP, Enterprise Security, Tanium

Mark Ostrowski

Head of Engineering for the East, US, Check Point

Michael Dubinsky

Head of Product Mgmt. - Zero Trust, Information Security Group, Symantec

Ashish Malpani

Sr. Director Product Marketing, Forcepoint

Ricardo Font

Senior Product Marketing Manager, Gigamon

James Locus

Sr. Manager, Product Marketing, Menlo Security

Draft Agenda / Session Date & Times



  • Tuesday, April 21st

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:30 am -
10:00 am
9:30 am - 10:00 am

Registration & Exhibit Browsing

10:00 am -
10:30 am
10:00 am - 10:30 am

When Perimeter Defenses Are Compromised: Applying Zero Trust Concepts to Achieve Cyber Defense-In-Depth

Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)

The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.

A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.

Attend this session to learn more about:

  • Multidimensional protection strategies
  • NIST's view of zero trust
  • The role of zero trust in this new defensive strategy
10:35 am -
10:50 am
10:35 am - 10:50 am

Tech Spotlight: Centrify

Speaker:
David McNeely, Chief Strategy Officer, Centrify

10:55 am -
11:25 am
10:55 am - 11:25 am Track A

Zero Trust - Keeping Secure in a Transforming World

Speaker:
Ricardo Font, Senior Product Marketing Manager, Gigamon

Over the last decade, many publicly reported breaches have caused organizations to re-think and re-architect their networks. Recent events have caused an additional shift in workforces, turning organizations inside-out, and increasing organizational risk. Zero Trust conventions, which take a data-centric view of organizational security, are becoming the norm. This change in convention helps ensure that the implicit trust granted to users, devices and applications, is reduced.

However, Zero Trust is often misunderstood, and its implementation, delayed. Join ISMG and Ricardo Font, Product Marketing Manager for Gigamon ThreatINSIGHT, as we look into Zero Trust.

Agenda:

  • An overview of Zero Trust
  • What changes are needed networks to support Zero Trust
  • Caveats and gotchas
  • Best practice implementation strategies
10:55 am - 11:25 am Track B

Ensuring Business Survival in times of Crisis: Changing the Economics Driving the Way You Manage and Secure Your Network

Speaker:
Jack Koons, Chief Cybersecurity Strategist, Unisys

This session will unpack and explore the current operational business environment - as informed by the ongoing crisis/pandemic and threat conditions - with an eye towards the new network realities going forward - to include such topics as zero trust, the use software defined perimeters vs firewalls and VPNs, and thoughts on extending operational reach and access of the remote work force, while at the same time ensuring integrity, resiliency, and competitive advantage of the supported business model.

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Win The Cyberwar With Zero Trust

Speaker:
John Kindervag, Field CTO, Palo Alto Networks

John Kindervag joined Palo Alto Networks as Field CTO after eight and one half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world's foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.

Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.

11:30 am - 12:00 pm Track B

Addressing the Shift to an All Remote Workforce

Speaker:
Dylan DeAnda, VP, Enterprise Security, Tanium

This session will provide recommendations on where to begin and what to consider, along with tales of real world responses to establishing a zero trust model in an all-remote enterprise. Attendees will find out how IT teams are reacting to the new enterprise landscape and will hear stories from the front lines, like the team who had but a few hours to figure out which doctors and other clinical professionals had operational webcams, in order to provide remote medical assessment services - both at local locations and to distant areas lacking enough doctors.

Attendees will learn:

  • Where to begin with a zero trust WFH enterprise
  • How to develop a unified endpoint management perspective
  • What to consider for continuous vulnerability and configuration management
  • How the world's largest organizations are managing risk and privacy with an all-remote workforce
12:00 am -
12:15 am
12:00 am - 12:15 am

Expo Hall & Networking Break

12:15 pm -
12:45 pm
12:15 pm - 12:45 pm Track A

Using Zero Trust for Fast Implementation of Secure Remote Access AND VPN Load Reduction

Speaker:
Michael Dubinsky, Head of Product Mgmt. - Zero Trust, Information Security Group, Symantec

In today's circumstances remote work is up by over 100%, demanding our security and infrastructure capabilities to overnight adapt to this change. Moreover, this requirement would not pass overnight and will impact us in the upcoming months, if not longer. In this session I will describe how cloud based solution, which are built based on the model of Zero Trust can help your infrastructure adapt quickly to this new 'remote' norm as well as drive increased security of your business.
12:15 pm - 12:45 pm Track B

Implementing Zero Trust: a Practical Blueprint

Speaker:
Ashish Malpani, Sr. Director Product Marketing, Forcepoint

Implementing 100% Zero Trust cybersecurity infrastructure is a daunting task and various factors pose a challenge in the adoption. Transition to a Zero Trust cybersecurity architecture is not a one size fits all approach. This session provides a practical approach to adopting Zero Trust while outlining the strategy, possibilities for leveraging existing investments, and the need for new investments.
12:50 pm -
1:05 pm
12:50 pm - 1:05 pm

Tech Spotlight: Menlo Security

Speaker:
James Locus, Sr. Manager, Product Marketing, Menlo Security

1:10 pm -
1:50 pm
1:10 pm - 1:50 pm

Panel: Zero Trust in Action - Practical Deployments

Speakers:
Bobby Singh, CISO & CTO, TMX Group
Chris Frenz, CISO, Interfaith Medical Center
Gary Hayslip, Director of Information Security, SoftBank Investment Advisers
Mark Ostrowski, Head of Engineering for the East, US, Check Point
Tom Field, Senior Vice President, Editorial, ISMG

Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. Hear actual case studies from CISOs discussing:

  • Use cases for zero trust;
  • Challenges to expect;
  • Metrics of success.
1:50 pm -
2:30 pm
1:50 pm - 2:30 pm

Expo Hall & Networking

View Schedule

SPONSORS / Supporting Organizations

Centrify
Check Point
Cyber Ark
Gigamon
Forcepoint
Menlo Security
Palo Alto Networks
Symantec
Tanium
Unisys

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

LOCATION / Venue & Address

Virtual Summit

Register and attend online.

Live presentations, Q&A, and Expo Hall demos will be held April 21st. All recordings will be available the 2 days following the summit.

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data