
9:30 am - 10:00 am

Registration & Exhibit Browsing

With many enterprises now employing a 100% remote workforce, more than ever security leaders need to know exactly who is logging into critical systems and accessing role-appropriate data. This is the role of zero trust. Not a product or a service, zero trust is a strategy that employs multifactor authentication, biometric and behavioral analytics and continuous monitoring to verify user identities and control access to sensitive resources.
Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the myths and realities about zero trust and how it is being deployed successfully.
April 21st @ 10:00 am EDT
Registering For a Group?
Call + 1 (609)-356-1499
Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)
The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.
A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.
Attend this session to learn more about:
Speaker:
Ricardo Font, Senior Product Marketing Manager, Gigamon
Over the last decade, many publicly reported breaches have caused organizations to re-think and re-architect their networks. Recent events have caused an additional shift in workforces, turning organizations inside-out, and increasing organizational risk. Zero Trust conventions, which take a data-centric view of organizational security, are becoming the norm. This change in convention helps ensure that the implicit trust granted to users, devices and applications, is reduced.
However, Zero Trust is often misunderstood, and its implementation, delayed. Join ISMG and Ricardo Font, Product Marketing Manager for Gigamon ThreatINSIGHT, as we look into Zero Trust.
Agenda:
Speaker:
Jack Koons, Chief Cybersecurity Strategist, Unisys
This session will unpack and explore the current operational business environment - as informed by the ongoing crisis/pandemic and threat conditions - with an eye towards the new network realities going forward - to include such topics as zero trust, the use software defined perimeters vs firewalls and VPNs, and thoughts on extending operational reach and access of the remote work force, while at the same time ensuring integrity, resiliency, and competitive advantage of the supported business model.
Speaker:
John Kindervag, Field CTO, Palo Alto Networks
John Kindervag joined Palo Alto Networks as Field CTO after eight and one half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world's foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Speaker:
Dylan DeAnda, VP, Enterprise Security, Tanium
This session will provide recommendations on where to begin and what to consider, along with tales of real world responses to establishing a zero trust model in an all-remote enterprise. Attendees will find out how IT teams are reacting to the new enterprise landscape and will hear stories from the front lines, like the team who had but a few hours to figure out which doctors and other clinical professionals had operational webcams, in order to provide remote medical assessment services - both at local locations and to distant areas lacking enough doctors.
Attendees will learn:
Speaker:
Michael Dubinsky, Head of Product Mgmt. - Zero Trust, Information Security Group, Symantec
Speaker:
Ashish Malpani, Sr. Director Product Marketing, Forcepoint
Speakers:
Bobby Singh, CISO & CTO, TMX GroupChris Frenz, CISO, Interfaith Medical CenterGary Hayslip, Director of Information Security, SoftBank Investment AdvisersMark Ostrowski, Head of Engineering for the East, US, Check PointTom Field, Senior Vice President, Editorial, ISMG
Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. Hear actual case studies from CISOs discussing:
Register and attend online.
Live presentations, Q&A, and Expo Hall demos will be held April 21st. All recordings will be available the 2 days following the summit.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com