Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
The world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.
Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.
Join Eric Anderson in an exploration of achieving the right balance between stringent security requirements and a seamless user experience.
ARIA Cybersecurity Solutions' Bill Bent outlines comprehensive approaches to cybersecurity risk management and details business outcomes of zero trust implementation.
Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.
Join Tom Field and John Horn, Director, Cybersecurity Practice, Aite-Novarica Group in an exploration of customer identity and access management.
Greg Touhill Director, CERT Division, Carnegie Mellon University Software Engineering Institute
Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!
Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.
Cloud migration, IoT deployment and zero trust architecture have been paradigm shifts for enterprises and their information security teams. But what about the impact on identity and access management? "It's big," says June Leung, director of IAM at Economical Insurance and a panelist in this session.
Jay Moloo of DB Schenker discusses implementing zero trust architecture in OT environments through network segmentation and modern standards.
LCRA's Ravindra Varma Lakamraju shares practical insights on implementing ZTNA framework for hybrid workforce security.
Join Sudip Banerjee for a discussion about zero-trust strategy and implementation.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Explore zero trust strategies with Sudip Banerjee, Field CTO at Zscaler. Learn phased approaches to zero trust, balancing agility with risk, and adapting security strategies for hybrid workforces and disappearing perimeters in a post-pandemic world.
Control application and database access when identity is the new perimeter. Explore how ZTNA enhances access policies, reporting, and threat detection. Gain insights into its use cases and its role within a connected cybersecurity strategy. Presented by Linette Mananghaya, Senior Security Solutions Engineer, Sophos.
Join Chip Mason, Lead, Mainframe Security Product Management, Broadcom, and Henk van Achterberg, Security Strategist, Broadcom as they discuss why zero trust is everywhere, in the cloud, on-premises including, and in the mainframe.
Zero trust is becoming a key enterprise security philosophy, raising questions about its practicality, priority, and challenges. This session explores whether zero trust should be a focus, its role in environments like IoT, and its impact on users, devices, and networks, along with business drivers like cloud and continuity needs. Join us to learn more and assess if zero trust is right for your organization.
Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile. Join Manish Dave, Head of Information Security, Aarti Industries Ltd. in a discussion of Zero Trust.
Join Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.
Billy Moore explores centralized secure access solutions for maritime OT systems, addressing IACS requirements and critical infrastructure protection.
Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.
In this session, John Kindervag shares the background of his research on broken trust models and identifies the fundamental problem of trusting the internal network and not the external network. Explore Zero Trust with the expert!
Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.
Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Explore Zero Trust Data Access (ZTDA) with Virtru's CTO Will Ackerly and CMO Matt Howard. Learn how decentralized policy controls can protect sensitive data wherever it goes while supporting the needs of a perimeterless digital world.
The concept of zero trust has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the zero trust promised land.
Satyavrat Mishra of Godrej, Rohit Rane of HDFC, Urvish Acharya of Aditya Birla Group and Prashant Deshpande of ISACA discuss implementing zero trust across industries and microsegmentation challenges.
Zero trust, supply chain security and DevSecOps.
Join George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.
John Kindervag, Creator of Zero Trust, discusses zero trust, a strategy designed to stop data breaches and other cyberattacks. Done right, it provides demonstrable, positive security outcomes for companies who adopt it. Done wrong, it is a whole different story.
In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.
Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.