Hi [[ session.user.profile.firstName ]]

Is Zero Trust Possible in a Remote Work Scenario?

Organizations worldwide have moved to remote work scenarios in response to the COVID-19 pandemic.

Moving to a remote workforce has presented CIOs and CISOs with key challenges surrounding the traditional perimeter security model. During this time, the health and safety of your enterprise workforce is paramount, but we know that security cannot take a back seat.

In this webinar, we will address the question, "Is Zero Trust possible in a Remote Work Scenario?"

Join JR Cunningham, VP of Strategic Solutions, as he addresses:

- What the Zero Trust security model is and how to approach a Zero Trust security program,
- How remote work has made the perimeter disappear,
- Should remote work drive a change in your Authentication Policy or Identity Strategy, and more

Join Herjavec Group and J.R. Cunningham to discuss key considerations and potential solutions for achieving Zero Trust in this new reality.
Recorded Apr 29 2020 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Herjavec Group
Presentation preview: Is Zero Trust Possible in a Remote Work Scenario?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 2020 Managed Security Services Trends Recorded: Jul 30 2020 25 mins
    Herjavec Group
    While the cybersecurity industry has become more advanced, especially with the introduction of automation and machine learning, adversaries have evolved just as much. In fact, most organizations believe that they will face a security incident in the next 6-12 months.

    In response, organizations are beginning to shift their approach to the type of security services to invest in. According to Gartner, more than 90% of buyers looking to outsource to security services providers will focus on threat detection and response services by 2024.

    Recently, Herjavec Group produced the 2020 MSS Trends Report in partnership with Cybersecurity Insiders. The report surveyed 400K infosec professionals across a variety of industries (such as healthcare, education, manufacturing, and more) to gain a better understanding of the key Managed Security Services challenges that organizations are facing.

    We asked questions regarding the state of incident response, the most concerning threats worrying organizations today, whether organizations have the necessary in-house resources needed for insider threat, SOAR technology, and even security workshops. Questions include:

    - Where are security leaders prioritizing their security investments?
    - Where are organizations leveraging third-party service providers to complement their in-house capabilities?
    - Which specialized Managed Services are at the forefront of these offerings?
    - What are the important questions you should be asking yourself as an IT business leader?

    In this webinar, we will address some of the most significant insights from the 2020 MSS Trends report so you can make effective decisions about your security investments with your internal IT team.

    You can download the full 2020 MSS Trends Report here: https://www.herjavecgroup.com/2020-MSS-Trends
  • How to Build a Strong Vulnerability Management Program Recorded: May 12 2020 51 mins
    Herjavec Group
    Organizations have always been challenged with building a strong vulnerability management program. However, remote work has presented CIOs/CISOs with a new set of challenges for this complex problem.

    A strong vulnerability management program allows organizations to identify potential security gaps and access points that threat actors leverage to gain entry into corporate networks, and then remediate them immediately.

    This webinar will feature insights from JR Cunningham, VP of Strategic Solutions at Herjavec Group, and Ed Bellis, Co-Founder & CTO of Kenna Security.

    Throughout the webinar, you will learn:

    - The challenges of building a vulnerability management program
    - How a remote workforce changes your plans as a CIO/CISO,
    - The 4 key categories that every successful vulnerability management program relies on, and
    - The importance of developing a risk-based vulnerability management program

    At the end of the webinar, you will also have the chance to put JR & Ed in the hot seat and ask them your toughest questions on vulnerability management.
  • Is Zero Trust Possible in a Remote Work Scenario? Recorded: Apr 29 2020 46 mins
    Herjavec Group
    Organizations worldwide have moved to remote work scenarios in response to the COVID-19 pandemic.

    Moving to a remote workforce has presented CIOs and CISOs with key challenges surrounding the traditional perimeter security model. During this time, the health and safety of your enterprise workforce is paramount, but we know that security cannot take a back seat.

    In this webinar, we will address the question, "Is Zero Trust possible in a Remote Work Scenario?"

    Join JR Cunningham, VP of Strategic Solutions, as he addresses:

    - What the Zero Trust security model is and how to approach a Zero Trust security program,
    - How remote work has made the perimeter disappear,
    - Should remote work drive a change in your Authentication Policy or Identity Strategy, and more

    Join Herjavec Group and J.R. Cunningham to discuss key considerations and potential solutions for achieving Zero Trust in this new reality.
  • CISO Recommendations in Response to COVID-19 and Global Pandemics Recorded: Mar 27 2020 35 mins
    Herjavec Group
    Given the global Coronavirus (COVID-19) pandemic, many organizations are moving to a remote workforce in an effort to mitigate the threat posed to the health of their employees and the general public.

    In this webinar, we will address the top C-level concerns for cybersecurity in light of global pandemics such as COVID-19. The webinar will cover how you can ensure the continuity of your enterprise business operations through planning, remote work access solutions, and 24/7 monitoring to reduce the risk of phishing attacks.

    Join JR Cunningham, VP of Strategic Solutions, as he addresses:

    - How can businesses handle remote access and security in light of the threat posed by a global pandemic?
    - What tools do you need to ensure your team is secure against insider threats?
    -What are the challenges to securing remote access?
    -How should you handle onsite work such as Incident Response and deploying security technologies?
    - Do your risk management strategies need to change in response to COVID-19? If so, how?

    During this time, the health and safety of your enterprise workforce is paramount, but we know that security cannot take a back seat.

    It's imperative for business leaders to encourage their teams to be aware of the tactics that threat actors use to gain entry into personal and corporate networks and instill diligence to ensure your networks are protected.
  • Solving the Mid-Market Identity Management Dilemma Recorded: Mar 12 2020 58 mins
    Herjavec Group
    As organizations continue to embrace digital transformation, it becomes critical to see security through the lens of Identity. In fact, one of the greatest cybersecurity challenges that enterprises will face in 2020 will be Identity management.

    Join Eric Cowperthwaite, VP of Professional Services at Herjavec Group, and Rob Wilson, Sr. Sales Engineer at SailPoint, for insights on how digital transformation is driving the need for building a context-aware Identity-focused security program.

    Key conversation topics include:

    1. How is Identity security changing for mid-market enterprises? What are the current challenges?
    2. How will embracing digital transformation change the need for Identity governance?
    3. What is the importance of building a context-aware security program vs. content-aware?

    You will hear about IdentityNOW, the first SaaS Identity governance solution in the Identity industry, and how it can benefit mid-market enterprises.

    Join our webinar and ask Eric & Rob some of your toughest questions about how the mid-market enterprises can accelerate their security programs with an Identity-centric focus in light of digital transformation.
  • How Are You Securing Your Digital Transformation? Recorded: Feb 5 2020 59 mins
    Herjavec Group
    In 2020, the top priorities for any CISO or CIO will be to manage the risk associated with digital transformation and to enhance your security programs in order to keep up with new technological advances & complexity.

    Join J.R. Cunningham, VP of Strategic Solutions at Herjavec Group, for insights on the demands of digital transformation in 2020 and how to advance your security programs in order to keep pace.

    Key conversation topics include:

    - What is digital transformation and how are businesses changing as a result?
    - What does digital transformation mean for IT?
    - How will digital transformation impact security practitioners and their ability to secure businesses embracing the digital world?
    - How will embracing digital transformation change the expectations enterprises have from their security providers?

    In addition, J.R. will touch on the value of context-based identity programs, threat modelling and SOAR tools for supporting the security of digital transformation efforts.

    Join our webinar and ask J.R. some of your toughest questions about how to advance cybersecurity programs in light of digital transformation.

    About J.R. Cunningham

    J.R. Cunningham has performed executive consulting, architecture, and assessment work across the globe and in a wide variety of industries, including finance, insurance, healthcare, education, the intelligence community, retail, and government. J.R. is noted for leveraging his IT, security and business acumen to build an industry respected consulting practice for Optiv. Prior to his work in security and risk, J.R. directed technology operations at MarketWatch.com, one of the world’s most visited websites. As VP of Strategic Solutions at Herjavec Group, J.R.’s areas of expertise include (i) building & running security programs (CISO & CIRO), (ii) Security Strategy Assessment & Consulting, (iii) Cyber Practitioner & SalesForce Leadership and (iv) creating successful product & services pipelines through strategic consulting.
  • Herjavec Group Managed Security Services Recorded: Jan 16 2020 2 mins
    Herjavec Group
    Herjavec Group’s SOC 2 Type 2 certified Managed Security Services Practice defends your organization from increasingly sophisticated, targeted cybercrime threats. We take on the day-to-day defense of your infrastructure by monitoring your network, systems and data, 24/7. We add value by providing context and enriching the data you receive, helping to optimize your organization’s IT security monitoring, incident detection, and incident response times.

    By recognizing that security is not purely a technology issue, we combine technical and human intelligence to enrich the information and alerts shared with our customers.
  • Herjavec Group Managed Security Services Workflow Recorded: Jan 16 2020 7 mins
    Herjavec Group
    At Herjavec Group, Information Security is what we do. We support your complete IT security lifecycle. From gap assessment to remediation and incident response, Herjavec Group is your trusted advisor in information security. Our industry-leading managed security services workflow is comprised of 5 steps, from Operational Readiness, to Event Resolution.
  • Is Identity the Foundation of My Enterprise Security Program? Recorded: Nov 20 2019 42 mins
    Herjavec Group
    SailPoint and Herjavec Group have partnered to help enterprises around the world solve Identity Challenges. 

    We see it every day - Multiple HRIS systems, Complex Credential Repositories to Manage, Classic Attack Paths targeting Elevated Privileges. To address these challenges, and prepare for identity in the cloud, we believe security leaders need to take a business-oriented approach to Identity Control.

    Join us for a webinar where Identity expert and industry veteran, Herjavec Group’s VP of Professional Services, Eric Cowperthwaite, will share his views on why Identity should be recognized as the foundation of security control.

    As a former CISO, Eric is well versed in the identity challenges most enterprises face and will address how to handle those pitfalls head-on as you proactively advance your cyber program. He will discuss the importance of identity governance & administration while considering enterprise requirements for a data warehouse, privileged access programs, and cloud controls.

    Plus, we’re putting Eric in the hot seat with a moderated Q&A led by Sailpoint’s James Toomey, so get your questions ready!

    Executive Insight from:

    Eric Cowperthwaite, VP Professional Services
    Eric has served as CISO at Providence Health & Services, Global Director of Information Security at Esterline Technologies, and has held a variety of Professional Services roles with expertise in risk management, governance, system engineering, and operational delivery. He is an expert in Identity Services believing strongly in the process of: (1) Building an Identity Management Foundation, (2) Prioritizing Privileged Access and (3) Controlling Access In The Cloud. Eric served in the US Army for 10 years and earned his Bachelor of Science in Computer Engineering from CSU.
  • Join Herjavec Group to Discuss the Top 3 PCI DSS Concerns in 2019 Recorded: Nov 13 2019 56 mins
    Herjavec Group
    Herjavec Group will be hosting a webinar with David Mundhenk, Principal Consultant at HG, to discuss the top three key areas where organizations need to sharpen their approach when adopting new technologies:

    - Cloud cardholder data environments (CDE)
    - The use of VoIP for financial transaction processing, and
    - The use of side-loaded code within the e-commerce transaction process.

    Feel free to join our webinar and ask David your toughest PCI questions!
  • Put Us In the Hot Seat - Ask HG Your Toughest Cyber Questions Recorded: Oct 29 2019 58 mins
    Executive Thought Leaders at Herjavec Group
    Ask Herjavec Group Your Burning Cybersecurity Questions with an Interactive Q&A Session.

    We get it. As a security practitioner you’re challenged to keep your organization secure, all while maintaining compliance and maximizing the value of cybersecurity investments. Cybersecurity is complicated. With varying levels of concern and new and emerging threats, it can be overwhelming.

    Tune into this live and interactive Q&A session and get answers to your toughest cybersecurity questions with executive thought leaders at Herjavec Group.

    Ask Us About:
    - Cybersecurity Awareness
    - Achieving and Maintaining Privacy and Compliance
    - Presenting Security to the Board
    - Protecting your Crown Jewels
    - Accountability with Improved Security KPIs
    - Accelerating your Cybersecurity Journey

    Panelists Include:
    Eric Cowperthwaite - VP Professional Services at Herjavec Group
    Ira Goldstein - COO at Herjavec Group
    Adam Crawford - VP Managed Services at Herjavec Group
  • Splunk for Security – The Power of Herjavec Group Managed Security Services Recorded: Oct 10 2019 46 mins
    Herjavec Group & Splunk Security Experts
    The sophistication of modern cyber attacks and the persistent nature of advanced threats requires organizations to re-evaluate their entire security ecosystem. The adoption of cloud, mobile workloads, and hybrid deployments have magnified the need for visibility into cloud services and applications. This requires a dynamic infrastructure and an application-wide view of activities to identify, investigate and respond to internal and external threats in real-time.

    Herjavec Group is the world’s leading Splunk for Security partner with expertise in Managed Security Services and Splunk Professional Services across Splunk Core, ES, UBA, and Phantom. We have been ranked the #1 Managed Security Services Provider on the Cybersecurity 500 and a Top 10 Global MSSP by MSSP Alert.

    Join Splunk and Herjavec Group Security experts to learn how you can identify, investigate and respond to internal and external threats in real-time without the complexity of a traditional SIEM.

    Webinar Topics:
    - Overview of Splunk for Security Threat Detection and Investigation
    - Introduction to Herjavec Group Managed Security Services
    - Demonstration of Herjavec Group’s proprietary HG Splunk Application for advanced visualization and investigation
    - Review practical applications and customer success stories
  • About Herjavec Group Recorded: Oct 9 2019 3 mins
    Herjavec Group
    Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations.

    At Herjavec Group, information security is what we do. Supporting your IT Security Lifecycle drives our business and your infrastructure’s protection is our only priority.

    We are an expert team of highly dedicated security specialists, supported by strategic and emerging technology partners, who are laser focused on information security for our enterprise customers.
  • Cybersecurity Awareness Tips Recorded: Oct 9 2019 1 min
    Herjavec Group
    Cybersecurity Awareness Month (CSAM) is a global initiative created by the Department of Homeland Security 16 years ago to recognize the importance of digital security for consumers and organizations alike. Enterprises, employees, and end users alike need to band together to #BeCyberSmart.

    As cybersecurity professionals, security encompasses a large part of our everyday lives. Regardless of your job function or experience level, there are simple steps everyone can take to maintain a safer digital presence, both professionally and personally. Whether it be at home with your family, traveling abroad, at school, or in the office, the following tips will ensure personal security but also preserve security at the enterprise level.
  • Herjavec Group Incident Response and Remediation Services Recorded: Oct 9 2019 4 mins
    Herjavec Group
    The threat of cybercrime is the new reality for enterprises worldwide. It is not a matter of if you will be targeted, it is a matter of when.

    Unfortunately, most organizations are not proactive in their approach to information security; until they have been breached.
  • Herjavec Group's Identity and Access Management Services Recorded: Oct 8 2019 3 mins
    Herjavec Group
    Excessive employee access is one of the fastest growing unmanaged risks to the protection of critical enterprise data and information assets. The impact of cloud, mobile devices, and IT consumerization, coupled with increasingly sophisticated cyber attacks, makes the possibility of a security breach a serious threat to enterprises globally. To proactively reduce these risks, Identity and Access Management has become a pivotal component of an organization’s Information Security Framework.
  • Herjavec Group: 24x7x365 Security Operations Center Recorded: Oct 8 2019 2 mins
    Herjavec Group
    Herjavec Group recently set out to explain what exactly goes on inside the rectangular box we call our Security Operations Center. We called on key members of our team and industry leaders to determine the answers to these questions. In the end, our big idea is simple: 24 Hours per Day, 7 Days per Week, 365 Days per Year we manage your network, systems and data.
  • Herjavec Group Los Angeles 24x7x365 Security Operations Center Recorded: Oct 8 2019 3 mins
    Herjavec Group
    Herjavec Group’s Managed Security Services practice is SOC 2 Type 2 certified and defends your organization from increasingly sophisticated, targeted cybercrime threats. We take on the day-to-day defense of your infrastructure by monitoring your network, systems, and data 24 hours per day, 7 days per week, 365 days per year, on-premise or in the cloud.
  • Herjavec Group: Information Security Is What We Do Recorded: Oct 8 2019 1 min
    Herjavec Group
    Herjavec Group is a global information security firm offering comprehensive protection to minimize cyber attacks and threats. Learn more about our services.
  • Ira Goldstein: Peak Breach in a World of Ubiquitous Computing Recorded: May 2 2019 16 mins
    Ira Goldstein
    On May 2, 2019, Ira Goldstein, SVP of Field Operations at Herjavec Group, spoke at the Ontario Tech University's The Future of Tech with a Conscious.

    Ira kicked off the Technology and Privacy panel with a keynote speech introducing a concept known as Peak Breach, derived from the idea of Peak Oil.

    "What I really want to ask is 'Are we past the point of peak breach?' Can it get any worse from a privacy perspective? Can it get any worse from a security perspective?" Ira asks.
Cybersecurity is complicated. We're here to help.
Dynamic entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity products and services to enterprise organizations. We have been recognized as one of the world’s most innovative cybersecurity operations leaders, and excel in complex, multi-technology environments. Our service expertise includes Advisory Services, Technology Architecture & Implementation, Identity Services, Managed Security Services, Threat Management, and Incident Response. Herjavec Group has offices and Security Operations Centers across the United States, United Kingdom, and Canada. For more information, visit www.herjavecgroup.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is Zero Trust Possible in a Remote Work Scenario?
  • Live at: Apr 29 2020 5:30 pm
  • Presented by: Herjavec Group
  • From:
Your email has been sent.
or close