Implementing Zero Trust

Feb 22, 2022

Zero Trust is a security model designed specifically to protect the security of sensitive data and critical applications by leveraging network and user segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access controls. Where traditional security models operate under the assumption that everything inside an organization’s perimeter can be trusted, the Zero Trust model recognizes that trust is a vulnerability.


Time (in PST)

9:30 am – 9:45 am Welcome and Opening Remarks

9:45 am – 10:30 am Session 1

10:30 am - 10:45 am Break

10:45 am - 11:30 am Session 2

11:30 am - 11:45 am Break

11:45 am - 12:30 pm Session 3

12:30 pm - 12:35 pm Key Takeaways and Closing Comments


Aviatrix logo

Firemon logo

Session 1

Zero Trust Building Blocks

  • Making sense of Acronym Soup - ZTNA, SASE, CASB, CNSP...

  • Role of SoC and xSOAR/Automation

  • Defining your ZTNA Strategy and prioritizing your activities.

Company: Palo Alto Networks

Speaker: Bob Lewinski, Systems Engineer

Bob has 20 years of System Engineering and Security Architecture experience. In his current role at Palo Alto Networks, Bob enables Organizations to adopt Long-Term SecurityStrategies which ensure uninterrupted Execution of Business Objectives.


Session 2

Towards Zero Trust in the Cloud - Embedding Security into Your Cloud Network

Company: Aviatrix

Speaker: Josh Cridlebaugh, Senior Solutions Strategist at Aviatrix

Josh is a secure cloud networking veteran, he brings over 10 years of knowledge and expertise in cloud, data center, network and network security. Before joining Aviatrix, Josh was a strategic engineer at Palo Alto Networks and lead secure cloud and cloud networking initiatives at several notable companies like Getty Images and Wizards of the Coast.

Twitter -

LinkedIn -

Facebook -

Session 3

The Journey to Zero Trust Starts by Tackling Complexity

Zero Trust was born to overturn the mindset of implied trust because a user, device, or service was within a defined perimeter. With today’s exponential growth of hybrid infrastructures, perimeter boundaries have all but vanished, leaving organizations with larger and unmanageable attack surfaces. Security enforcement must start with every connection. If the basic principles of implementing a Zero Trust Network Architecture (ZTNA) are followed, the results can improve the overall security posture of an organization. But what about challenging the growth of network complexity across a hybrid surface? As organizations migrate from perimeter architectures to ZTNA, complexity undermines zero trust at every turn. This presentation will review the principles of a Zero Trust approach and identify unnecessary complexity that will compromise implementation efforts if left unchallenged.

Company: FireMon

Speaker: Tim Woods

Tim brings more than 20 years of security experience to his role as VP of Technology Alliances at FireMon. His global engagements have given him great insights across virtually every market sector and enterprises of all sizes. Tim believes his most important task is education and raising awareness to build strong organizational security postures. According to Tim, “Fighting complacency in security should be everyone’s top priority if we are to win the war on cybercrime.”




Copyright © 2024
Fuel User Group
All Rights Reserved
All material, files, logos and trademarks within this site are properties of their respective organizations.
Follow Us