Dr. Chase Cunningham - Forrester and Amit Bareket - Perimeter 81
While the principle of "never trust, always verify" has remained the same since the inception of Zero Trust almost two decades ago, the way that it is achieved differs based on changing technology. The Zero Trust model predated the digital transformation, cloud adoption, and shift to remote work - trends that would not have been possible without it. This idea, designed to protect modern digital environments, leverages network segmentation, helps prevent lateral movement, and simplifies granular user-access control by enforcing user authentication.
Understanding the key concepts behind Zero Trust is crucial for securing your organization's network in today's day and age. In times where remote work and cloud adoption are on the rise, the perimeter is everywhere and adopting Zero Trust is especially important as it is not dependent on a location. With the individualized approach of Zero Trust, organizations can customize security for specific resources, users, applications and data. Achieving Zero Trust is neither as costly nor complex as often assumed as it is built upon existing architecture and does not require replacing technology.
In this webinar, Perimeter 81 Co-founder and CEO, host Amit Bareket, will be joined by the man who brought Zero Trust to the forefront, Principal Analyst at Forrester, guest speaker Dr. Chase Cunningham. Together, they will explore how Zero Trust was conceived and what it entailed then, practical examples from the present day, and the vision for using Zero Trust moving forward. Perimeter 81 will also conduct a live product demo of the Perimeter 81 platform.
Host: Amit Bareket - Co-founder and CEO of Perimeter 81
Guest Speaker: Dr. Chase Cunningham - Dr. Chase Cunningham - VP, Principal Analyst serving Security & Risk Professionals at Forrester
Moderator: Karen Mesoznik - Sr. Director of Corporate Marketing at Perimeter 81
Amit Bareket - Co-founder & CEO of Perimeter 81 and Paul Asadoorian - Chief Innovation Officer at Cyber Risk Alliance
While COVID-19 may have accelerated remote work and cloud adoption, these trends have steadily prevailed as the modern workforce changed dramatically over the past decade. Despite this, organizations are still using 30-year old legacy hardware, such as VPNs, to connect to resources from outside the office.
For decades, professionals in charge of organizations’ networks were entirely focused on defining perimeters and setting up a line of defense to keep threats out. This approach served businesses well, with finite exposure points and attack vectors, and adherence to established best practices and frameworks. Today, strategies are changing, and the boundaries of organizations’ networks have become borderless - ever expanding to a growing number of endpoints and networks. Accordingly, the threat landscape is increasingly dangerous.
The traditional network we once knew can no longer be trusted and is no longer adequate in securing remote and on-premises access. Additionally, the typical organization’s network is more complicated than ever, and traffic through these networks is increasingly convoluted, with data flowing between local resources, cloud applications, and mobile devices in rapid succession.
Join Amit Bareket (Co-founder & CEO of Perimeter 81) and Paul Asadoorian (Chief Innovation Officer at Cyber Risk Alliance) for a technical deep-dive into the problems inherent in legacy VPN technology and how traditional solutions are putting our networks at risk, instead of securing them. Together they will explore solutions for the modern workforce and how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity.
The behavior and decision-making processes of individuals have a direct impact on modern network security. If 90% of data breaches are caused by human error, understanding the way we think and behave is essential to successfully implementing cybersecurity frameworks and improving their effectiveness. On the other hand, humans are completely irrational.
Fortunately, behavioral economics can help us understand why users make “bad security decisions” such as sharing devices, choosing poor passwords, downloading questionable links, etc. That’s even more important during the remote work era, when personal security hygiene has a greater impact on overall network health and one wrong decision can affect an entire organization.
In today’s day and age where home is the new office and the perimeter is everywhere, behavioral economists would say that companies are seriously putting themselves at risk. By granting employees (and devices) too much access with little control in the way of monitoring or segmentation, the door opens further to hacks and breaches. Organizations must adjust to the new reality of a distributed workforce, and there is much to be learned from the behavioral economics discipline in regards to security posture.
Join behavioral scientist Dr. Maria Blekher and cybersecurity experts Sivan Tehila and Sounil Yu to uncover the connection between behavioral economics and managing cybersecurity risks. Together, they will review the various factors that impact employees’ security decisions, and how we can apply them to our new remote work reality.
Sivan Tehila - Cybersecurity Expert, Director of Solution Architecture at Perimeter 81, Founder of Cyber Ladies NYC
Dr. Maria Blekher - Behavioral Scientist, Founding Director at YU Innovation Lab, Clinical Associate Professor of Digital Strategies, Yeshiva University
Sounil Yu - CISO in Residence at YL Ventures and Former Chief Security Scientist at Bank of America
Jim Finnerty and Jeff Rathmann, Moderated by Kevin Romo
Silo City IT is a premier Managed Security Service Provider and Solutions Architecture firm specializing in Artificial Intelligence-based solutions.
Join Ingram Micro partner Jeff Rathmann (CEO at Silo City IT) in conversation with Jim Finnerty (Channel Partner Manager at Perimeter 81) to learn how they are using Zero Trust network and application access for real world use cases in the age of remote work.
- How Ingram Micro Partners Benefit using Perimeter 81
- Considerations When Securing Remote Access for Clients
- Practical Use Cases for Agentless VPN Access
- Network Security Capabilities of a Cloud-based, SaaS Platform
Jeff Rathmann- CEO at Silo City IT
Jim Finnerty,- Channel Partner Manager at Perimeter 81
Moderated by Kevin Romo - Associate Marketing Manager at Ingram Micro Cloud
Keren Elazari and Sivan Tehila, Moderated by Karen Mesoznik
Remote work is here for the long run, and as businesses adapt to the new normal, hackers are also adjusting to - and taking advantage of - this new status quo. The COVID-19 pandemic has changed the way we work by transitioning most of the workforce to be remote and turning our homes into offices. This shift has seen hackers and cybercriminals modify their approach and adapt their hacking methods accordingly.
The combination of rapid cloud adoption, BYOD, and remote work have opened the door to new breaches and hacks. This requires organizations to transform their defensive playbooks and to better understand how hackers are utilizing the crisis for data theft. Recognizing how criminal business models have evolved is key to protecting our data and resources in the present.
Join Keren Elazari (Cyber Security Analyst, Author & Researcher) and Sivan Tehila (Director of Solution Architecture at Perimeter 81) in a discussion about the evolution of security threats and cyber crime in our new remote work era. From Zoom bombing to account takeovers, access mining and phishing, we’ll shed light on emerging security threats and empower the audience with practical ideas on how to build a more secure future for your organization.
Keren Elazari - Cyber Security Analyst, Author & Researcher
Sivan Tehila - Director of Solution Architecture at Perimeter 81
Moderated by Karen Mesoznik - Sr. Director of Corporate Marketing at Perimeter 81
Zev Brodsky - Content Marketing Manager at Perimeter & Sivan Tehila - Director of Solution Architecture at Perimeter 81
Beyond The Perimeter Podcast, Episode 04: Your Security Strategy Is Only as Strong as Your Security Hygiene
In this edition of the Beyond the Perimeter Podcast, we discussed the Promo.com data breach and interviewed Sivan Tehila, our very own Director of Solution Architecture, to gain her insights about security hygiene.
Zev Brodsky - Content Marketing Manager at Perimeter & Len Noe - White Hat Hacker and Cyber Security Specialist
Beyond The Perimeter Podcast, Episode 03: Hacking with a Purpose: Life as a White Hat Hacker
In this edition of the Beyond the Perimeter Podcast, we discussed the Twitter hack which saw many famous celebrity accounts being hijacked which resulted in spreading a cryptocurrency scam. We also interviewed Len Noe who is a white hat hacker and cyber security specialist.
The transition to the cloud is inevitable and necessary, but it comes with a host of cyber risks. Streamlining and automating testing of mobile and desktop apps through the cloud saves organizations time, money, and resources but it is important to make sure that the testing environment on the cloud is secured. When testing product, web, or mobile applications, employees’ networks and connections must be secured in order to add another layer of protection against hackers trying to breach the testing environment.
In this webinar, security experts Sivan Tehila and Justin Dolly will discuss:
- The various threats to your network and to your testing environment that have come about as a result of remote work
- How cybersecurity is an integral part of the organization's business continuity plan
- Tips and best practices for securing the home network when the endpoint is now everywhere
About the Speakers:
Sivan Tehila is the Director of Solution Architecture at Perimeter 81. Sivan is a cybersecurity expert with over 13 years of experience in the industry, having served in the IDF as an Intelligence Officer and then in various field positions including Information Security Officer and a cybersecurity consultant. For the past two years, Sivan has dedicated herself to promoting women in Cybersecurity and founded the Leading Cyber Ladies community in NYC.
Justin Dolly is Chief Security Officer at Sauce Labs, where he oversees the development and implementation of the company’s long-term security strategy, ensuring its customers have the highest level of protection to support their digital goals. He is a Certified Chief Information Security Officer (CCISO) with more than 20 years of experience in building and implementing a culture of security within global organizations.
Richard Stiennon - Industry Analyst & Amit Bareket - Perimeter 81, Moderated by Karen Mesoznik - Perimeter 81
In addition to all of the demographic, economic, and healthcare implications brought on by COVID-19, the once-familiar 9-to-5 office environment as we know it has changed dramatically. Remote work, once expected to be the future, is now our new reality. Even though Gartner predicted that by 2020, half of the US workforce would be working remotely, no one could have anticipated it to become ubiquitous during the COVID-19 outbreak. Now, nearly everyone has been forced to work from home for the foreseeable future. Organizations have been seeing an increase in productivity from employees and have extended their work from home policies until the end of 2020, or even indefinitely.
Along with all of its benefits, remote work also brings a host of cyber security risks that are harder to tackle outside of the office. Additionally, with millions of people connecting to their corporate networks from their homes, network infrastructure is being taxed like never before, creating new issues of internet overload and skyrocketing VPN usage.
While the future remains uncertain, organizations are embracing the new normal, and now is the time for CISOs and IT managers to start thinking about how they will continue securing their teams while working remotely. Join us as we discuss the future of cyber security, and how the pandemic that changed the world is inevitably accelerating the way we consume cyber and network security.
Zev Brodsky - Content Marketing Manager at Perimeter & Reut Weitzman- COO and Cybersecurity Consultant at QMasters
Beyond The Perimeter Podcast, Episode 02: Young Startup: Are You Ready for a CISO Onboard?
In this edition of the Beyond the Perimeter Podcast, we explained how millions of Chrome users might be affected by the Google Chrome security breach and we interviewed Ms. Reut Weitzman who is the COO and Cybersecurity Consultant at QMasters to learn about her experience and insights as a CISO at a startup.
Jim Finnerty - Channel Partner Manager at Perimeter 81 and Sivan Tehila - Director of Solution Architecture at Perimeter 81
In this webinar for MSPs and resellers, hosted by our partner Ingram Micro Cloud, we cover:
1. How to easily incorporate the Zero Trust security model in your network architecture
2. What are Perimeter 81’s unique features?
3. How can Perimeter 81 benefit partners and MSPs?
4. The future of network security: a one-stop shop for network and security needs
With the rise of the mobile workforce and cloud transformation, the traditional network we once knew can no longer be trusted. Many companies are moving to cloud infrastructures such as AWS, Google Cloud, Azure, etc. However, many companies are still using the same site-centric and hardware-based network security appliances that are no longer adequate in securing remote and on-premises access.
Unlike traditional hardware-based network security providers, Perimeter 81 provides greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers, giving companies of all industries and sizes the power to be securely mobile and cloud-confident.
In this interactive product webinar with a live demo and Q&A session. Sivan Tehila, Director of Solution Architecture, and James Alvarez, Director of Strategic Growth, discussed why more organizations are implementing the Zero Trust model for securing their application access.
Sagi Gidali - Co-founder and CPO of Perimeter 81 and Ori Ainy - Founder of Beam Global
What does it take to bring a B2B product from inception to being recognized as an industry leader? Beam Global’s Ori Ainy speaks with Sagi Gidali, Co-Founder and CPO of Perimeter 81, on the marketing strategies that Sagi has relied on to achieve success in the global network security industry. From technology partnerships to a precisely-honed sales funnel, B2B companies can learn what it takes to stand out in this enlightening interview.
Sivan Tehila and Nicole Becher, Moderated by Guy Franklin
The new reality that has developed over the past few weeks has forced most organizations to rapidly adopt a company-wide work from home policy. While some organizations have a cyber and network security plan in place, many are not aware of the risks that threaten company data and employees while connecting remotely.
From a hacker’s perspective, the shift to remote work is a perfect time to strike. In stressful times, it is important not to let our guard down and to educate employees on the importance of cyber hygiene in order to protect their personal data and the organization’s sensitive resources.
Join us as we explore the various cyber risks and threats facing us in these challenging times, and learn how to protect your company, data, and employees from becoming a target. We will present options and practical solutions for securely and seamlessly securing your organization’s network and keeping your valuable resources safe.
In this 45-minute webinar, we will explain how Perimeter 81, with a combination of AWS transit gateway, gives organizations the simplicity of accessing cloud resources in a secure way from anywhere in the world.
Together with AWS and our client SuperData, a Nielsen Company, we will explore the options for simplifying connectivity to AWS transit gateways using our platform.
Amit Bareket discusses SASE, the latest trend in network security. While cloud and mobility are changing the way we work, resources are moving to the cloud and employees are becoming digital nomads. Gartner recently coined the term SASE (Secure Access Service Edge), which is about unifying security and networking through the cloud edge, creating a multi-tenant and multi-regional platform to consume security regardless of the employees’, data centers’, cloud services’, or on-premise offices’ location. Tune in to learn how Perimeter 81 is achieving this and to hear more about the future of network security.
Rob Clyde (ISACA), Shahrokh Shahidzadeh (Acceptto), James Alvarez ( Perimeter 81)
Controlling who has access to your organization's resources and data assets and making sure that only the right users can access the right resources at the right time remains a challenge in 2020. With a third of network compromises involving the use of stolen credentials, it's more important now than ever to employ identity, access and authentication management to protect the access to your enterprise environment.
Join industry leaders and IAM experts for a Q&A roundtable discussion on how to secure identities and access in today's multi-cloud world.
Viewers will learn more about:
- Why identity is the new perimeter
- Biggest challenges associated with digital identity, authentication and cloud access
- How to continue offering your customers and users the agility they have come to expect employing data protection measures
This panel will be broadcast LIVE during RSA Conference in San Francisco.
Rob Clyde, Chair, ISACA & Board Director, Titus (Moderator)
Shahrokh Shahidzadeh, CEO, Acceptto
James Alvarez, Director of Strategic Growth, Perimeter 81
Cloud and mobility are creating a mega shift in traditional network security, and hardware-based solutions are not capable of accommodating this migration. Unlike legacy solutions, Perimeter 81’s Zero Trust Secure Network as a Service utilizes a Software-Defined Perimeter architecture, offering greater network visibility, seamless onboarding, and full compatibility with all major cloud providers.
Perimeter 81 also incorporates robust security capabilities following the SASE model, a term coined by Gartner to describe the convergence of security and network management inside one platform. Our product, which subscribes to this new concept gives companies of all industries and sizes the power to be fully mobile and completely cloud-confident.
[Podcast] A Day in the Life of a Security Incident Response ExpertZev Brodsky - Content Marketing Manager at Perimeter & Reut Menashe - Incident Response and Founder of Tetrisponse[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]31 mins