Hi [[ session.user.profile.firstName ]]

Deciphering Trust in a Zero Trust World

What do Zero Trust and the move to the cloud really mean to organizations? How do you determine who and what to trust and when and where to trust them? What about perimeters, security zones, and networks? Does defense in depth still work? In this session, Karen Reinhardt, Systems Engineer Principle at the Home Depot, will cover how the cloud is pushing Zero Trust principles and what that can mean for traditional enterprise security, and how to approach the challenge of deciphering security and designing secure solutions in hybrid environments.
Recorded Aug 3 2021 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Karen ReinHardt
Presentation preview: Deciphering Trust in a Zero Trust World

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Find Your Voice, Increase Your Influence Nov 16 2021 7:00 pm UTC 60 mins
    Samara Moore and Jodi Scrofani
    See yourself as an influencer? Desire to further your influence? We bring unique experiences, perspectives and talent to our organizations, and we want to be heard! This session will explore influencing styles and ways to effectively adapt your influencing style while being authentic.
  • The Importance of Male Allies Nov 9 2021 7:00 pm UTC 60 mins
    Pam Lindemoen, Stephen Jones, and Daniel DeSantis
    It is Cisco’s purpose to power an inclusive future for all. This begins in the workplace with a culture that fosters diversity and inclusion. Join us on November 09, 2021, to hear about the role of male allies in helping to foster an environment of diversity and inclusion.
  • Using the Cyber Table Top (CTT) Process to Perform a Cyber Risk Assessment Nov 3 2021 6:00 pm UTC 60 mins
    Katie Premore
    The Cyber Table Top (CTT) process was developed in 2014 to support DoD customers who were overwhelmed by the sheer number of findings produced by traditional cybersecurity scanning tools and checklist processes. These tools and processes identify a very large number of possible vulnerabilities for a system but didn’t provide context for which vulnerabilities might truly lead to potential mission failure. Since budgets are limited, customers need methods of focusing on the most critical vulnerabilities which present the highest risk to their systems. The CTT process is focused on producing actionable cyber vulnerability data in an approachable risk matrix format to enable teams to focus resources. CTTs bring together system developers and maintainers, system users, and expert red teams to execute a multi-day wargame that focuses on the security evaluation of threats that would deny, degrade, disrupt or destroy a system and prohibit users from accomplishing their core mission. By assessing the potential mission impact of vulnerabilities as well as their likelihood/difficulty it provides a way to understand the relative risks of various vulnerabilities and focus the remediation efforts. The CTT process has been used to support DoD system cyber security evaluations in various lifecycle stages from design through long-term maintenance. It has been used to identify and mitigate threats that later were witnessed “in the wild” and caused significant negative impacts to other systems. It has become so popular that an official DoD Guidebook and training course was developed in 2018.
  • A Trailblazer’s Path to a Career in Cybersecurity Oct 28 2021 6:00 pm UTC 60 mins
    Michele Guel
    Diversity and inclusion in the technology industry and workforce do not happen overnight. Hear from trailblazer Michele Guel, who helped pave the way for future generations of women to get involved in technology and cybersecurity. Learn how Michele’s career began, what the technology culture and landscape were like when she started in her career (the hurdles, hoops, and wins); and how to start and stay in cybersecurity, including today’s challenges and career outlook for women in the technology industry.
  • Ensuring a Technology Relevant Workforce Oct 18 2021 6:00 pm UTC 60 mins
    Pam Sheary
    The pace of emerging technologies has increased significantly, challenging individuals to maintain knowledge of relevant skills and Business Areas to staff programs with the appropriate level of engineering skills needed for optimum performance on contract in a timely manner. Develop strategies that enable a proactive rather than reactive approach, allowing engineers and organizations to stay ahead of the curve to optimize on contract performance and be prepared for future work. Learn about different engineering shapes to determine which shape is most appropriate for you and /or your organization. Broaden your horizons and explore available options that can be used to develop a Personal Development Plan that includes learning new skills and gaining experience using these skills. Don’t miss opportunities – stay ahead of the curve!

    Pam Sheary is a Lockheed Martin Fellow with 30+ years of software and systems engineering experience in the Department of Defense (DoD) industry, including 12 years managing International software development efforts. She continues to serve as the Chief Software Engineer on very large government contracts. Pam is a recognized technical leader within Agile / DevSecOps, Quantitative Management, and Risk and Opportunity Management. Pam’s work to establish Enterprise-level Code Quality has been leveraged across various government agencies. Prior to joining Lockheed Martin, Pam served in various Software and Systems engineering roles developing and testing software embedded systems and application development tools with geographically dispersed teams. Pam earned a bachelor’s degree in Computer Science & Mathematics from the University of Pittsburgh with continued graduate studies in Computer Engineering and Web Design /Accessibility. She holds several certifications, including the Scaled Agile Framework (SAFe®) and SAFe® for Government.
  • Imposter Syndrome, Perspectives for Black Women in Tech Oct 13 2021 6:00 pm UTC 60 mins
    Alexis Robinson, Olivia Liddell, Janeen Morehead and Nafi Diallo
    Imposter syndrome often involves experiencing feelings of inadequacy and insecurity, particularly in the workplace. In this session, you will learn about imposter syndrome from the perspectives of four Black women in tech. This includes how to recognize imposter syndrome and actionable strategies that you can take to help you overcome it.
  • Cloud Security Architecture Oct 12 2021 6:00 pm UTC 60 mins
    Sunitha Kumar
    Cloud is where our data lives, is where code resides, applications run, and decisions are made. With this huge responsibility placed on Cloud, it becomes a rich target for attackers to mime private data, insert malware into code or applications, as well as influence the decisions. This talk will provide an overview of cloud security, with an emphasis on secure design leaning on core building blocks such as Identity Management, storage security, key management.
  • Let’s Crack Passwords Oct 5 2021 6:00 pm UTC 60 mins
    Marisa Midler, Chesleah Kribs, and Destiney Plaza
    Have you ever wondered how a hacker can crack your password? Learn from Penetration Testers as they demonstrate password cracking. During this talk you will learn: how to crack a password yourself, what are common mistakes we humans make, and how to protect yourself from becoming an easy target.
  • How D&I can Lead to Product Innovation Sep 30 2021 5:00 pm UTC 60 mins
    Rochelle Fisher
    From years ago to today, the challenges for women in security industries have evolved but do not completely disappear. What can we expect from our colleagues today and how do we overcome these challenges? With a real-life case study from SentinelOne, a Cyber Security solution provider, we see how a corporate culture of diversity and innovation crashed the glass ceiling and enabled risk-taking that led to product enhancements.
  • 5G IoT Security Recorded: Sep 16 2021 34 mins
    Praveena Sridhar
    5G IoT is the latest in the IoT World. This next generation of mobile technology, with features such as Enhanced Mobile Broadband, Ultra-Reliable Low Latency Communication, and Massive IoT, is set to radically re-shape today’s mobile networks. This webinar aims at depicting the high-level composition of the end-to-end 5G network architecture termed as 5GS (5G System) and Security in this space.
  • No Silver Bullet – Essence and Accident in Cyber Resiliency Engineering Recorded: Sep 14 2021 57 mins
    Teresa Merklin
    Cybersecurity incidents and failures impact critical public infrastructure, national defense, corporate economic interests, and personal privacy. As the magnitude and frequency of cyber events continues to escalate, vendors and agencies are desperately seeking solutions to solve this issue once and for all. In the 1980’s the software development industry was facing similar challenges. That crisis prompted Frederick Brooks to write his iconic paper “No Silver Bullet – Essence and Accident in Software Engineering.” The solutions and technologies detailed in that paper are eerily similar to the “breakthrough” solutions currently proposed for cyber. This presentation examines the “Silver Bullets” of cybersecurity, lessons we can learn from that parallel history, and the essence of challenges that confront modern security practitioners.

    Teresa Merklin is a Fellow at Lockheed Martin where she specializes in Cyber Risk Assessment and Engineering for Cyber Resiliency. She is currently attached to the Aeronautics Cyber Range which performs cyber assessment and penetration testing across the complete portfolio of Lockheed Martin aircraft and related systems. She has 30+ years of career experience starting out in embedded software development which slowly morphed into cybersecurity over time. Teresa holds a BSEE from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, and an MBA from the University of Dallas. She holds the CISSP and CSSLP certifications.
  • 5G and Cyber Threats Recorded: Aug 24 2021 51 mins
    Katie Grzywacz
    5G brings the power to connect billions of new devices and enable their use in new ways. With that comes significant risk. What types of threats does 5G introduce and what should we consider as we start incorporating 5G into our products?

    Katie Grzywacz is a Lockheed Martin Associate Fellow and is the chief cyber architect for the LM Space Centers of Excellence. She has 16+ years of experience that includes security engineering and offensive security testing. She is currently researching cyber threat scenarios that apply to a multitude of 5G use cases.
  • Preparing for your Security Career Journey Recorded: Aug 23 2021 60 mins
    Google Team
    Are you curious about different paths within the Security Industry? Are you working on your resume and looking to learn best practices for applying to roles? If so, join us in this webinar to hear from Google Security Engineers and our recruiting team on their career journeys, how to navigate the complexity of a rapidly expanding industry and how to best present yourself for interviews.
  • Developing the "Easy Button" for Security Services Recorded: Aug 5 2021 39 mins
    Rhonda Bricco
    Enterprise Security Front Office is the single point of entry for security-related questions or requests for service. A dedicated team is always ready to assist customers via an 800# or an internal request tool, making sure customers receive the best support. As the Front Office team is focused on providing a positive customer experience, they need to fully understand the request from potentially non-technical requestors.

    During this webinar, Rhonda will be talking about Developing the “Easy Button” for Security Services. She will share her insights and experiences as an Optum employee, working with several security teams, system owners and end-users building the Front Office. She will review opportunities, networking challenges and lessons learned working to master a global support model for security in a matrixed corporate environment.
  • Develop Cyber Genius with the Cyber Aptitude and Talent Assessment Recorded: Aug 4 2021 59 mins
    Doug Britton, Amy Cappellanti-Wolf & Dr. Mike Bunting
    Please join us in a panel discussion as we explore the challenges surrounding talent development in the cybersecurity industry from professional development, to recruiting, hiring, and building high-performing teams. Cyber Aptitude and Talent Assessment (CATA) identifies the cognitive overlap between aspiring individuals and master practitioners. Identifying that overlap allows for powerful predictions about future success in a variety of cybersec positions such as offensive, defensive, analytical/forensic, or design/development positions.

    You'll leave this talk with a deeper understanding of the scientific rigor that validates and sets the CATA tool apart, how CATA helps the individual cybersec professional (and anyone wishing to become a cyber sec pro) align their career decisions with their innate cyber aptitude, how human resource managers can streamline their talent pipeline, eliminate noise, and find the best possible candidates for their org, and how hiring managers can use CATA to cognitively fingerprint their highest performing teams and develop a talent mapping and succession plan.
  • Deciphering Trust in a Zero Trust World Recorded: Aug 3 2021 59 mins
    Karen ReinHardt
    What do Zero Trust and the move to the cloud really mean to organizations? How do you determine who and what to trust and when and where to trust them? What about perimeters, security zones, and networks? Does defense in depth still work? In this session, Karen Reinhardt, Systems Engineer Principle at the Home Depot, will cover how the cloud is pushing Zero Trust principles and what that can mean for traditional enterprise security, and how to approach the challenge of deciphering security and designing secure solutions in hybrid environments.
  • WiCyS Security Training Scholarship: The GRIT and the GLORY Recorded: Jul 8 2021 67 mins
    Scholarship Recipients
    Explore the journey of how 15 scholarship recipients with diverse backgrounds, cultures, ethnicities, locations, experiences, and more, joined forces in the WiCyS Security Training cohort and came out cyber champs ready for action. In this webinar, we will celebrate the grit and the glory of these soon-to-be-cybersecurity professionals. Join us to learn about the opportunities that lie ahead, the collective strength of the community, and what initiatives are underway that can impact your cybersecurity career trajectory!
  • Securing and Managing Risks Associated with the Supplier Ecosystem Recorded: Jun 29 2021 62 mins
    Hemma Prafullchandra and Hadley Edwards
    CEOs continue to rank risk management as one of their top business priorities, on par with innovation, efficiency, and productivity. In a world where there is no longer a perimeter, increasingly sophisticated threats are targeting other avenues to breach the organization across the applications, infrastructure, devices, and people they leverage from their suppliers (inclusive of vendors and third-party providers).

    As outsourcing for apps, infrastructure, devices, and human capital expands, the adoption of tools to monitor multiple tiers of suppliers for quality, security, integrity, and resilience risks is also growing, and the plethora of frameworks and approaches that organizations are leveraging today continues to grow in tandem. Additional complexity emerges when frameworks are applied inconsistently within an organization and across suppliers, or if multiple of frameworks are in play. This presentation aims to take an especially close look at the cyber/digital supply chain, identifying common challenges, potential approaches to manage supplier ecosystem risk, and emergent tech that will have an impact on supplier ecosystem management – for good or for ill.
  • AWS Recruiting Tips and Tricks Recorded: Jun 16 2021 61 mins
    AWS Team
    The AWS evolution has been driven by the spirit of innovation that is part of its DNA. The work environment is fast-paced and continually evolving, and every Amazonian is passionate about ownership and delivering results for the company. AWS strives to hire the brightest minds around the globe, and has various career opportunities. Thousands of candidates are interviewed every day for a range of jobs including technical, non-technical, security-focused, and other industry specializations. Join this webinar to learn what makes candidates stand out and how to prepare for an interview at AWS. You will hear from female members of the AWS Recruiting, AWS Security, and AWS Professional Services teams about interviewing at AWS and the career journeys that led them to AWS.

    Ashley Shimer: Manager - AWS Recruiting
    Donna Dodson: Sr. Principal Scientist - AWS Security
    Alexis Robinson: Government Assessment Manager - AWS Security
    Michelle Bozman: Sr. Practice Manager - AWS Professional Services
    Sarah Currey: Security Consultant - AWS Professional Services
  • How to WOW Submission Reviewers with a Stellar Proposal Recorded: Jun 9 2021 61 mins
    Diana Kelley, Alyssa Miller, Chloe Messdaghi, Tennisha Martin
    So you want to showcase your skills and speak at a technical conference? Great. Your voice matters. Conference organizers highly value new voices, and they are always on the lookout for ways to bring more talent to the stage. The good news is that there are opportunities abound and by submitting to conferences, you're honing in on your expertise, experience and knowledge, creating the most stellar of proposals. Join us for an honest discussion of cybersecurity industry influencers who weren't always used to being accepted when they initially submitted for speaking opportunities. They will share their stories of how they transformed every "no" into a "YES"!
Advancing the mission of diversity in the cybersecurity workforce
Addressing diversity and talent shortages in cybersecurity through recruiting, retaining and advancing women in the field of cybersecurity, and improving on the very low 20-24% statistic of women in cybersecurity jobs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Deciphering Trust in a Zero Trust World
  • Live at: Aug 3 2021 6:00 pm
  • Presented by: Karen ReinHardt
  • From:
Your email has been sent.
or close