We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Zero Trust Architecture

Search

Clear Expand Collapse

All Other Identities: Implications for Zero Trust

The world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.

Course duration Duration: 33 minutes

An Identity-First Approach to Your Zero Trust Journey

Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.

Price
Course duration Duration: 25 minutes

Building a Seamless Path to Zero Trust Networking

Join Eric Anderson in an exploration of achieving the right balance between stringent security requirements and a seamless user experience.

Price
Course duration Duration: 30 minutes

Building the Business Case for Zero Trust Security

ARIA Cybersecurity Solutions' Bill Bent outlines comprehensive approaches to cybersecurity risk management and details business outcomes of zero trust implementation.

Price
Course duration Duration: 30 minutes

Can Zero Trust & Risk Management Coexist?

Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.

Price
Course duration Duration: 31 minutes

CIAM's Unique Challenges to CISOs & Cybersecurity

Join Tom Field and John Horn, Director, Cybersecurity Practice, Aite-Novarica Group in an exploration of customer identity and access management.

Course duration Duration: 25 minutes

Cyber Tech 2030: The Next Chapter in AI, Zero Trust and Offensive Defense

Varun Singla of Bharti Airtel, Ajit Hatti of PureID, Mrudul Uchil of Visa and Leeladhar Meena of NCIIPC explore offensive defense, zero trust implementation and quantum computing's cybersecurity impact.

Price
Course duration Duration: 35 minutes

Cybersecurity's Role in Digital Transformation

Massimo Nardone demonstrates how zero trust security principles can be applied to manufacturing environments to enable safer digital transformation with focus on access management challenges.

Price
Course duration Duration: 10 minutes

Decentralized by Design: Adopting Zero Trust in Diverse OT Environments

Josh Martin explores flexible zero trust frameworks that adapt to unique industrial settings while providing centralized oversight and control.

Price
Course duration Duration: 30 minutes

Demystifying Zero Trust with Greg Touhill

Greg Touhill
Director, CERT Division, Carnegie Mellon University Software Engineering Institute

Course duration Duration: 30 minutes

End-User Case Study: Ensuring Data Security With Zero Trust Architecture Model

Dr. Sharique Raza of UAE Financial Institutions UAE explores zero trust principles and regional cybersecurity regulations. Learn practical approaches to align with UAE and Saudi frameworks while strengthening your organization's security posture.

Price
Course duration Duration: 30 minutes

Engineering Secure ICS and OT Environments

Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!

Course duration Duration: 40 minutes

Ensuring Data Security With Zero Trust Architecture Model

Sharique Raza, senior security architect at Financial Institutions UAE, explores the shift from implicit trust to zero trust architecture, detailing the five key pillars of zero trust implementation.

Price
Course duration Duration: 30 minutes

Extending Zero Trust to OT and Factory Environments

As Industry 4.0 and 5.0 reshape manufacturing, zero trust architecture is key to securing hyperconnected operations from lateral threats. Learn how Zscaler and Price Industries tackle cyber risks in modern factories without added complexity.

Price
Course duration Duration: 20 minutes

How Windows 11 Enables Zero Trust Protection

Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.

Course duration Duration: 25 minutes

Identity & Access Management: From Apps to Zero Trust

Cloud migration, IoT deployment and zero trust architecture have been paradigm shifts for enterprises and their information security teams. But what about the impact on identity and access management? "It's big," says June Leung, director of IAM at Economical Insurance and a panelist in this session.

Course duration Duration: 30 minutes

Identity-Based Zero Trust: A Use Case Perspective

Amruta Gawde, Bala Ramanan and Dr. Ram Kumar G share perspectives on contextual security, AI integration for authentication, and implementing zero trust access across hybrid environments.

Price
Course duration Duration: 35 minutes

Implementing a Zero Trust Architecture for System Security

Jay Moloo of DB Schenker discusses implementing zero trust architecture in OT environments through network segmentation and modern standards.

Price
Course duration Duration: 30 minutes

Implementing a Zero Trust Network Architecture

LCRA's Ravindra Varma Lakamraju shares practical insights on implementing ZTNA framework for hybrid workforce security.

Price
Course duration Duration: 30 minutes

Implementing Zero Trust & Gaining Buy-In

Join Sudip Banerjee for a discussion about zero-trust strategy and implementation.

Price
Course duration Duration: 25 minutes

Modernizing Security: How to Choose the Right Advanced Solutions

Brian Foster of Southern California Edison, Connie Devine of Excelerate Energy and Roger Caslow of HRSD share insights on vetting security solutions.

Price
Course duration Duration: 30 minutes

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

OT Security: Zero Trust With IEC 62443 & NIST

OT Security Expert Tamas Buzgo explores why a zero trust approach is essential for protection against ransomware and malware, and how to ensure zero trust with NIST, ISA 62443 and ISO 27001.

Price
Course duration Duration: 25 minutes

Practical Approach to Implementing Zero Trust

Explore zero trust strategies with Sudip Banerjee, Field CTO at Zscaler. Learn phased approaches to zero trust, balancing agility with risk, and adapting security strategies for hybrid workforces and disappearing perimeters in a post-pandemic world.

Price
Course duration Duration: 30 minutes

Securing Users' Access to Applications Using ZTNA

Control application and database access when identity is the new perimeter. Explore how ZTNA enhances access policies, reporting, and threat detection. Gain insights into its use cases and its role within a connected cybersecurity strategy. Presented by Linette Mananghaya, Senior Security Solutions Engineer, Sophos.

Course duration Duration: 15 minutes

Securing Your Business With Zero Trust

Join Chip Mason, Lead, Mainframe Security Product Management, Broadcom, and Henk van Achterberg, Security Strategist, Broadcom as they discuss why zero trust is everywhere, in the cloud, on-premises including, and in the mainframe.

Course duration Duration: 25 minutes

Security Meets Convenience: Rise of Adaptive Access Controls

Ganesh Chellappa of ManageEngine explores how adaptive access controls use AI to balance security and user experience, discussing solutions beyond traditional measures and integrating AI into zero trust strategies.

Price
Course duration Duration: 20 minutes

Starting With Zero Trust

Zero trust is becoming a key enterprise security philosophy, raising questions about its practicality, priority, and challenges. This session explores whether zero trust should be a focus, its role in environments like IoT, and its impact on users, devices, and networks, along with business drivers like cloud and continuity needs. Join us to learn more and assess if zero trust is right for your organization.

Course duration Duration: 25 minutes

The Road to Zero Trust Security

Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile. Join Manish Dave, Head of Information Security, Aarti Industries Ltd. in a discussion of Zero Trust.

Course duration Duration: 30 minutes

This Is How You Fail

Join Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.

Course duration Duration: 27 minutes

Vendor-Agnostic Zero Trust Remote Operations in Maritime

Billy Moore explores centralized secure access solutions for maritime OT systems, addressing IACS requirements and critical infrastructure protection.

Price
Course duration Duration: 25 minutes

Zero Trust & Cyber Resilience: A CISO's Approach

Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.

Price
Course duration Duration: 30 minutes

Zero Trust 101 - John Kindervag

In this session, John Kindervag shares the background of his research on broken trust models and identifies the fundamental problem of trusting the internal network and not the external network. Explore Zero Trust with the expert!

Course duration Duration: 1 hour 17 min.

Zero Trust and Microsegmentation

Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.

Course duration Duration: 12 minutes

Zero Trust Case Study: Inwood Bank

Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.

Course duration Duration: 25 minutes

Zero Trust Data Access

Explore Zero Trust Data Access (ZTDA) with Virtru's CTO Will Ackerly and CMO Matt Howard. Learn how decentralized policy controls can protect sensitive data wherever it goes while supporting the needs of a perimeterless digital world.

Course duration Duration: 30 minutes

Zero Trust for OT Security: A Practical Use Case

Mini Sharma and Dr. Yusuf Hashmi discuss implementing zero trust for OT environments through continuous authentication, microsegmentation and real-time monitoring while ensuring operational continuity.

Price
Course duration Duration: 30 minutes

Zero Trust Myth Busting

The concept of zero trust has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the zero trust promised land.

Course duration Duration: 45 minutes

Zero Trust Security

Satyavrat Mishra of Godrej, Rohit Rane of HDFC, Urvish Acharya of Aditya Birla Group and Prashant Deshpande of ISACA discuss implementing zero trust across industries and microsegmentation challenges.

Price
Course duration Duration: 20 minutes

Zero Trust, The DoD & You

Zero trust, supply chain security and DevSecOps.

Course duration Duration: 40 minutes

Zero Trust: The Key to Securing Higher Education

Join George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.

Course duration Duration: 40 minutes

Zero Trust: The Strategic Approach

John Kindervag, Creator of Zero Trust, discusses zero trust, a strategy designed to stop data breaches and other cyberattacks. Done right, it provides demonstrable, positive security outcomes for companies who adopt it. Done wrong, it is a whole different story.

Course duration Duration: 28 minutes

ZT Q&A with Greg Touhill

In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.

Course duration Duration: 11 minutes

ZTNA-Evolving Beyond Antiquated VPNs

Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.

Course duration Duration: 30 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement