Implementing Zero Trust
Feb 22, 2022
Zero Trust is a security model designed specifically to protect the security of sensitive data and critical applications by leveraging network and user segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access controls. Where traditional security models operate under the assumption that everything inside an organization’s perimeter can be trusted, the Zero Trust model recognizes that trust is a vulnerability.
Time (in PST)
9:30 am – 9:45 am Welcome and Opening Remarks
9:45 am – 10:30 am Session 1
10:30 am - 10:45 am Break
10:45 am - 11:30 am Session 2
11:30 am - 11:45 am Break
11:45 am - 12:30 pm Session 3
12:30 pm - 12:35 pm Key Takeaways and Closing Comments
Zero Trust Building Blocks
Making sense of Acronym Soup - ZTNA, SASE, CASB, CNSP...
Role of SoC and xSOAR/Automation
Defining your ZTNA Strategy and prioritizing your activities.
Company: Palo Alto Networks
Speaker: Bob Lewinski, Systems Engineer
Bob has 20 years of System Engineering and Security Architecture experience. In his current role at Palo Alto Networks, Bob enables Organizations to adopt Long-Term SecurityStrategies which ensure uninterrupted Execution of Business Objectives.
Towards Zero Trust in the Cloud - Embedding Security into Your Cloud Network
Speaker: Josh Cridlebaugh, Senior Solutions Strategist at Aviatrix
Josh is a secure cloud networking veteran, he brings over 10 years of knowledge and expertise in cloud, data center, network and network security. Before joining Aviatrix, Josh was a strategic engineer at Palo Alto Networks and lead secure cloud and cloud networking initiatives at several notable companies like Getty Images and Wizards of the Coast.
Twitter - https://twitter.com/aviatrixsys
LinkedIn - https://www.linkedin.com/company/aviatrix-systems/mycompany/
Facebook - https://www.facebook.com/AviatrixSystems/
The Journey to Zero Trust Starts by Tackling Complexity
Zero Trust was born to overturn the mindset of implied trust because a user, device, or service was within a defined perimeter. With today’s exponential growth of hybrid infrastructures, perimeter boundaries have all but vanished, leaving organizations with larger and unmanageable attack surfaces. Security enforcement must start with every connection. If the basic principles of implementing a Zero Trust Network Architecture (ZTNA) are followed, the results can improve the overall security posture of an organization. But what about challenging the growth of network complexity across a hybrid surface? As organizations migrate from perimeter architectures to ZTNA, complexity undermines zero trust at every turn. This presentation will review the principles of a Zero Trust approach and identify unnecessary complexity that will compromise implementation efforts if left unchallenged.
Speaker: Tim Woods
Tim brings more than 20 years of security experience to his role as VP of Technology Alliances at FireMon. His global engagements have given him great insights across virtually every market sector and enterprises of all sizes. Tim believes his most important task is education and raising awareness to build strong organizational security postures. According to Tim, “Fighting complacency in security should be everyone’s top priority if we are to win the war on cybercrime.”