8233fc4e-afa9-4c7f-904b-f24185b18804.jfif

Implementing Zero Trust

thumbnail (1).jpg

Zero Trust is a security model designed specifically to protect the security of sensitive data

and critical applications by leveraging network and user segmentation, preventing lateral

movement, providing Layer 7 threat prevention, and simplifying granular user-access controls.

Where traditional security models operate under the assumption that everything inside an

organization’s perimeter can be trusted, the Zero Trust model recognizes that trust is a

vulnerability.

REGISTER FOR VIRTUAL SPARK USER SUMMIT 

SCHEDULE AT A GLANCE*

Time (in PST) 

9:30 am – 9:45 am

Welcome and Opening Remarks

9:45 am – 10:30 am

Session 1

10:30 am - 10:45 am

Break

10:45 am - 11:30 am

Session 2

11:30 am - 11:45 am

Break

11:45 am - 12:30 pm

Session 3

12:30 pm - 12:35 pm

Key Takeaways and Closing Comments

*Times are subject to change


Session 1

Zero Trust Building Blocks

  • Making sense of Acronym Soup - ZTNA, SASE, CASB, CNSP...
  • Role of SoC and xSOAR/Automation
  • Defining your ZTNA Strategy and prioritizing your activities.

Company: Palo Alto Networks

Speaker: Bob Lewinski, Systems Engineer

Bob has 20 years of System Engineering and Security Architecture experience. In his current role at Palo Alto Networks, Bob enables Organizations to adopt Long-Term Security Strategies which ensure uninterrupted Execution of Business Objectives.

LinkedIn: www.linkedin.com/in/boblewinski/

View the recording here

 

Session 2

Towards Zero Trust in the Cloud - Embedding Security into Your Cloud Network

Company: Aviatrix

Speaker: Josh Cridlebaugh, Senior Solutions Strategist at Aviatrix

Josh is a secure cloud networking veteran, he brings over 10 years of knowledge and expertise in cloud, data center, network and network security. Before joining Aviatrix, Josh was a strategic engineer at Palo Alto Networks and lead secure cloud and cloud networking initiatives at several notable companies like Getty Images and Wizards of the Coast.

Twitter - https://twitter.com/aviatrixsys

LinkedIn - https://www.linkedin.com/company/aviatrix-systems/mycompany/

Facebook - https://www.facebook.com/AviatrixSystems/

View the recording here

 

Session 3

The Journey to Zero Trust Starts by Tackling Complexity 

Zero Trust was born to overturn the mindset of implied trust because a user, device, or service was within a defined perimeter. With today’s exponential growth of hybrid infrastructures, perimeter boundaries have all but vanished, leaving organizations with larger and unmanageable attack surfaces. Security enforcement must start with every connection. If the basic principles of implementing a Zero Trust Network Architecture (ZTNA) are followed, the results can improve the overall security posture of an organization. But what about challenging the growth of network complexity across a hybrid surface? As organizations migrate from perimeter architectures to ZTNA, complexity undermines zero trust at every turn. This presentation will review the principles of a Zero Trust approach and identify unnecessary complexity that will compromise implementation efforts if left unchallenged. 

Company: FireMon         

Speaker: Tim Woods

Tim brings more than 20 years of security experience to his role as VP of Technology Alliances at FireMon. His global engagements have given him great insights across virtually every market sector and enterprises of all sizes. Tim believes his most important task is education and raising awareness to build strong organizational security postures. According to Tim, “Fighting complacency in security should be everyone’s top priority if we are to win the war on cybercrime.”

Facebook: www.facebook.com/firemon

Twitter: www.twitter.com/firemon

LinkedIn: www.linkedin.com/company/firemon

View the recording here

 SPONSORS

logo-aviatrix.png

Firemon horizontal.png