Hi [[ session.user.profile.firstName ]]

Fast-track the Cybersecurity Executive Order with Zero Trust Segmentation

The Roadmap to Build your Zero Trust action plan in 60 days with Illumio

Zero Trust Security is no longer just an option for federal agencies, it is a must have.

The Biden administration issued a long-awaited cybersecurity executive order on May 12, 2021 that requires federal agencies to develop an implementation plan for a Zero Trust security architecture.

Requirements for federal agencies to implement a Zero Trust Architecture include:
• Adopt Zero Trust as a security strategy
• Improve the security and integrity of the software supply chain
• Develop a plan to implement a Zero Trust Architecture, in line with NIST guidance within 60 days

Illumio can help fast-track your Agency’s Zero Trust Architecture

As a Zero Trust Segmentation leader in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020 report, we have the solution to help you deliver on your Executive Order Zero Trust action plan.

Join us for this webinar to learn the details to get you started. We will cover how to:
• Understand the Executive Order Zero Trust implementation requirements
• Achieve Zero Trust Architecture deliverables with Illumio Zero Trust Segmentation
• Adapt NIST 800-207 components and approaches for your organization

Discover how Illumio can help you fast-track your Executive Order timelines and plan your path to a Zero Trust Architecture.

“This new Executive Order acknowledges that we fundamentally need to change the way we think about cyber resiliency – and it starts with Zero Trust.” states Andrew Rubin, CEO, Illumio.
Recorded Jun 1 2021 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vivian Tero, Senior Product Marketing Manager, Federal, Illumio
Presentation preview: Fast-track the Cybersecurity Executive Order with Zero Trust Segmentation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Visibilität ist der Schlüssel zum Erfolg. Haben Sie Ihren? Aug 17 2021 7:00 am UTC 35 mins
    Alex Goller - Regional Sales Engineer, Illumio
    Visibilität ist ein Eckpfeiler in jeder Zero Trust Strategie. Haben Sie den Überblick in Ihrem Datencenter haben oder ist Ihre Infrastruktur über die letzten Jahre immer komplexer geworden? Der Wechsel von rein On-Premise zu Hybrid- und/oder Cloud-Umgebungen hat viele neue Anforderungen an die Sicherheit Ihrer Infrastruktur geschaffen. Aber nur was Sie sehen, können Sie auch effektiv schützen. Wie zeigen Ihnen wie.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Aug 12 2021 10:00 am UTC 60 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Aug 12 2021 1:00 am UTC 60 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Aug 11 2021 6:00 pm UTC 60 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • 5 Security Design Practices for Your Modern Data Center - EMEA Aug 10 2021 9:00 am UTC 48 mins
    Sam Rastogi, Product Marketing Director, Illumio and Christer Swartz, Principal Technical Marketing Engineer, Illumio
    Today’s data center network is changing with the adoption of technologies like SDN, HCI, and virtualization that enable greater IT efficiency, programmability, and network agility to enable your business to move faster with the delivery of dynamic workloads anytime, anywhere.

    With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabric while reducing risk and strengthen overall security and availability.

    Watch this webinar today where our expert will present how you can design an effective data center security strategy to enable robust protection of your workloads everywhere.

    This webinar will cover the following data center and hybrid cloud security topics including:
    · Key trends, challenges and recommended security strategies for securing your data center fabric and multi-cloud environment for effective Zero Trust.
    · 5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds.
  • Guide to Micro-Segmentation and Compliance - EMEA Aug 5 2021 9:00 am UTC 25 mins
    Raghu Nandakumara- Field CTO, Illumio
    Industry regulators and standards bodies are increasingly mandating micro-segmentation as a necessary control in company networks in order to limit the ability of attackers to move laterally.

    In this presentation we'll discuss:
    - Everything you need to know about micro-segmentation
    - How effective this control is in hindering attackers
    - What has driven change in compliance requirements
    - A specific mandate and how micro-segmentation can be used to achieve it.
  • Mikrosegmentierung erfolgreich umsetzen (auf Deutsch) EMEA Aug 5 2021 8:00 am UTC 57 mins
    Oliver Keizers, Illumio & Alex Goller, Illumio
    In unserem Webinar erfahren Sie, wie Sie Betriebsabläufe vereinfachen und die Security Ihres Unternehmens verbessern können. Netzwerke dienen dazu, Objekte miteinander zu verbinden. Sicherheit bedeutet, Objekte zu isolieren. Finden Sie die perfekte Balance zwischen Konnektivität und Sicherheit mit einem innovativen Ansatz zur Mikro-Segmentierung.

    Webinar-Highlights

    • Verringern Sie Sicherheitsrisiken, indem Sie Sicherheitsmaßnahmen näher an dem umsetzen, was gesichert werden soll: der Applikation.
    • Verbessern Sie Ihre Agilität in allen Umgebungen (physisch, Cloud, virtualisiert und Container)
    • Nehmen Sie Änderungen an Segmentierungsrichtlinien ohne Auswirkungen auf das Netzwerk vor
  • Micro-Segmentation and Compliance - APAC Aug 5 2021 12:00 am UTC 25 mins
    Raghu Nandakumara- Field CTO, Illumio
    Industry regulators and standards bodies are increasingly mandating micro-segmentation as a necessary control in company networks in order to limit the ability of attackers to move laterally. In this presentation we cover the basics of micro-segmentation, understand how effective this control is in hindering attackers, look at what has driven change in compliance requirements, and wrap up by looking at a specific mandate and how micro-segmentation can be used to achieve it.
  • Achieving Success: A Practical Guide to Executing Zero Trust - EMEA Aug 4 2021 9:00 am UTC 31 mins
    Russell Goodwin -Field CTO, EMEA, Illumio
    Focusing primarily on perimeter security and firewalls is no longer enough. Many organizations are now adopting the Zero Trust security mindset of “never trust, always verify” to segment internal networks and prevent the spread of breaches.

    Join us to learn the next step towards Zero Trust security to architect optimal micro-segmentation controls with automated policy creation to reduce risk and deployment complexity.

    - Define and automate the right level of Zero Trust segmentation controls (from environmental separation to process level) across endpoints and East-West traffic.
    - Identify and map segmentation policies based on the exploitability of vulnerabilities and use segmentation as a compensating control when you can't patch.
    - Visualize and test policies before enforcement to ensure you don’t break applications while provisioning security at birth in cloud-native applications.
  • Zero Trust in the real world: ein erster Schritt in die Praxis (auf Deutsch) Aug 4 2021 8:00 am UTC 47 mins
    Alex Goller, System Engineer, Illumio & Oliver Keizers, Regional Director, Illumio
    Zero Trust ist ein Sicherheits-Framework, das auf der Annahme basiert, dass man auch in der IT-Sicherheit nicht vertrauen und stets kontrollieren sollte.

    Lernen Sie praktische Ansätze kennen um Zero Trust zu implementieren. Orientieren Sie Sich dabei an das Framework von Forrester Research und minimieren Sie die Angriffsoberfläche, verbessern Sie die Sichtbarkeit, reduzieren Sie Zeitaufwand und Kosten und stärken Sie Ihre Gesamtsicherheit um Ihr Unternehmen vor Datenabfluss und Sicherheits-Vorfällen zu schützen.
  • Achieving Success: A Practical Guide to Executing Zero Trust - APAC Aug 4 2021 12:00 am UTC 31 mins
    Russell Goodwin -Field CTO, EMEA, Illumio
    Focusing primarily on perimeter security and firewalls is no longer enough. Many organizations are now adopting the Zero Trust security mindset of “never trust, always verify” to segment internal networks and prevent the spread of breaches.

    Join us to learn the next step towards Zero Trust security to architect optimal micro-segmentation controls with automated policy creation to reduce risk and deployment complexity.

    - Define and automate the right level of Zero Trust segmentation controls (from environmental separation to process level) across endpoints and East-West traffic.
    - Identify and map segmentation policies based on the exploitability of vulnerabilities and use segmentation as a compensating control when you can't patch.
    - Visualize and test policies before enforcement to ensure you don’t break applications while provisioning security at birth in cloud-native applications.
  • The Building Blocks: How Zero Trust Meets Illumio - EMEA Aug 3 2021 9:00 am UTC 30 mins
    Adam Brady – Director, Systems Engineering, Illumio
    In this session, learn how Illumio Core was built from the ground up with the central tenet of a default-deny policy model including:

    - How visibility and Application Dependency Mapping allow for a Zero-Trust network policy to be built
    - Host-based segmentation - and the inherent Zero Trust Advantages
    - Illumio Policy and it's Zero Trust implications
    - Selective Enforcement/Boundaries - and how they can be used to more easily achieve Zero Trust
  • The Building Blocks: How Zero Trust Meets Illumio - APAC Aug 3 2021 12:00 am UTC 30 mins
    Adam Brady – Director, Systems Engineering, Illumio
    In this session, learn how Illumio Core was built from the ground up with the central tenet of a default-deny policy model including:

    - How visibility and Application Dependency Mapping allow for a Zero-Trust network policy to be built
    - Host-based segmentation - and the inherent Zero Trust Advantages
    - Illumio Policy and it's Zero Trust implications
    - Selective Enforcement/Boundaries - and how they can be used to more easily achieve Zero Trust
  • Visibilität ist der Schlüssel zum Erfolg. Haben Sie Ihren? Recorded: Jul 29 2021 35 mins
    Alex Goller - Regional Sales Engineer, Illumio
    Visibilität ist ein Eckpfeiler in jeder Zero Trust Strategie. Haben Sie den Überblick in Ihrem Datencenter haben oder ist Ihre Infrastruktur über die letzten Jahre immer komplexer geworden? Der Wechsel von rein On-Premise zu Hybrid- und/oder Cloud-Umgebungen hat viele neue Anforderungen an die Sicherheit Ihrer Infrastruktur geschaffen. Aber nur was Sie sehen, können Sie auch effektiv schützen. Wie zeigen Ihnen wie.
  • Building a Zero Trust Strategy - EMEA Recorded: Jul 29 2021 31 mins
    Michael Adjei – Systems Engineer, Illumio
    In this session, learn how Illumio helps you solve the threat of lateral movement.  Using Micro-segmentation as a compensating control.
  • Building a Zero Trust Strategy - APAC Recorded: Jul 29 2021 31 mins
    Michael Adjei – Systems Engineer, Illumio
    In this session, learn how Illumio helps you solve the threat of lateral movement.  Using Micro-segmentation as a compensating control.
  • Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey (AMS) Recorded: Jul 28 2021 65 mins
    Raghu Nandakumara- Field CTO, Illumio & James Young-Security Strategist, Splunk
    Investing in a Zero Trust approach to security helps organizations mitigate cyber threats by improving their preventative controls and enhancing their ability to detect and respond to incidents.

    Illumio Core enables customers to see every flow within their environment, understand application dependencies, and enforce context-based micro-segmentation policies. Splunk, with its powerful analytics, alerting, and response capabilities, allows users to ingest the telemetry that Illumio provides, identify anomalous behavior and trigger preventative action. Brought together, Illumio Core and Splunk provide an effective way to protect and defend against the threat of lateral movement.

    Join this webinar to understand how customers can take advantage of the Illumio/Splunk integration to:
    . Support their move to Zero Trust,
    . Enhance their ability to detect and mitigate threats, and
    . Improve their overall security posture.
  • Zero Trust Is Not No Trust - EMEA Recorded: Jul 28 2021 24 mins
    Raghu Nandakumara – Field CTO, Illumio
    In this session we will explore a Zero Trust approach to security and what can often make it seem an obtainable objective, before focusing on strategies that can make it digestible and achievable, and ultimately lead to a constant measurable improvement in an organisation's cyber risk exposure.
  • Zero Trust Is Not No Trust - APAC Recorded: Jul 28 2021 24 mins
    Raghu Nandakumara – Field CTO, Illumio
    In this session we will explore a Zero Trust approach to security and what can often make it seem an obtainable objective, before focussing on strategies that can make it digestible and achievable, and ultimately lead to a constant measurable improvement in an organisation's cyber risk exposure.
  • Fast-track the Cybersecurity Executive Order with Zero Trust Segmentation Recorded: Jul 27 2021 43 mins
    Vivian Tero, Senior Product Marketing Manager, Federal, Illumio
    The Roadmap to Build your Zero Trust action plan in 60 days with Illumio

    Zero Trust Security is no longer just an option for federal agencies, it is a must have.

    The Biden administration issued a long-awaited cybersecurity executive order on May 12, 2021 that requires federal agencies to develop an implementation plan for a Zero Trust security architecture.

    Illumio can help fast-track your Agency’s Zero Trust Architecture as a Zero Trust Segmentation leader in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020 report, we have the solution to help you deliver on your Executive Order Zero Trust action plan.

    Join us for this webinar to learn the details to get you started. We will cover how to:
    • Understand the Executive Order Zero Trust implementation requirements
    • Achieve Zero Trust Architecture deliverables with Illumio Zero Trust Segmentation
    • Adapt NIST 800-207 components and approaches for your organization

    Discover how Illumio can help you fast-track your Executive Order timelines and plan your path to a Zero Trust Architecture.

    “This new Executive Order acknowledges that we fundamentally need to change the way we think about cyber resiliency – and it starts with Zero Trust.” states Andrew Rubin, CEO, Illumio.
A leader in Zero Trust Segmentation
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Fast-track the Cybersecurity Executive Order with Zero Trust Segmentation
  • Live at: Jun 1 2021 5:00 pm
  • Presented by: Vivian Tero, Senior Product Marketing Manager, Federal, Illumio
  • From:
Your email has been sent.
or close