Hi [[ session.user.profile.firstName ]]

How to Reduce Your Attack Surface with Zero Trust

It’s getting complicated out there! Mobile workforces, complex infrastructures and device proliferation compound the ever-growing risks associated with securing your corporate network.

Experts from Appgate and Optiv Security reveal how Zero Trust security handles the challenges of sprawling IT in order to reduce your attack surface, stop unsanctioned lateral movement and minimize the risk of breaches.

Listen in to learn about the fundamentals you need to become a smaller target, including how to:

• Protect from the edge to your largest attack surface – people
• Make your infrastructure and workloads invisible
• Extend Zero Trust to connected devices
• Prevent lateral movement
Recorded Apr 27 2021 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Garbis, Author of Zero Trust Security Guide at Appgate, and Aaron Palermo, Co-author of SDP Architecture Guide at Optiv
Presentation preview: How to Reduce Your Attack Surface with Zero Trust

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Introducing Zero Trust Security: An Enterprise Guide Recorded: Apr 27 2021 56 mins
    Jason Garbis, Brigadier General (Ret.) Greg Touhill, and Tom Field
    Zero Trust is a major industry trend that fundamentally changes the underlying methodology of enterprise security … moving from outdated and demonstrably ineffective perimeter-centric methods to a dynamic, identity-centric, policy-based approach.

    Join Jason Garbis, author of the newly released book, Introducing Zero Trust: An Enterprise Guide, for an energetic discussion with leading Zero Trust experts to get insights on:

    • The origins of Zero Trust security
    • The biggest misperceptions of Zero Trust
    • How Zero Trust is evolving
    • What are the next advancements in Zero Trust?
  • How to Reduce Your Attack Surface with Zero Trust Recorded: Apr 27 2021 55 mins
    Jason Garbis, Author of Zero Trust Security Guide at Appgate, and Aaron Palermo, Co-author of SDP Architecture Guide at Optiv
    It’s getting complicated out there! Mobile workforces, complex infrastructures and device proliferation compound the ever-growing risks associated with securing your corporate network.

    Experts from Appgate and Optiv Security reveal how Zero Trust security handles the challenges of sprawling IT in order to reduce your attack surface, stop unsanctioned lateral movement and minimize the risk of breaches.

    Listen in to learn about the fundamentals you need to become a smaller target, including how to:

    • Protect from the edge to your largest attack surface – people
    • Make your infrastructure and workloads invisible
    • Extend Zero Trust to connected devices
    • Prevent lateral movement
  • Identity-Centric Security: The Zero Trust Perspective Recorded: Mar 18 2021 53 mins
    Jason Garbis, SVP of Products at Appgate
    In this session we explore the limitations of traditional security architectures, and explain how Zero Trust is best achieved with a new, open, and identity-centric model – the Software-Defined Perimeter (SDP) – which can significantly improve enterprise security, and finally let organizations bridge the gap between identity and network security. SDP verifies and secures all access to all resources, strictly limits network access, and literally makes network resources invisible to unauthorized users. We’ll explain how SDP avoids the limitations of traditional security architectures, delivers fine-grained network access control in a way that’s tied to each user’s context, and is dynamically responsive to changes in enterprise environments. We’ll conclude with an enterprise case study, showing how one organization obtained technical, business, and compliance benefits.

    After this presentation, attendees will:
    - Understand the core principles of Zero Trust security, and why it’s important to adopt them now
    - How enterprises can achieve Zero Trust via a Software-Defined Perimeter architecture
    - See a customer case study of how they’ve used this approach to obtain significant business, technical, and security benefits in the cloud
    - Understand the ways in which their organization can quickly begin a Zero Trust journey, integrating with and enhancing their existing IT and Security infrastructure
  • Four Steps to Secure Access in 2021 Recorded: Mar 8 2021 51 mins
    Dr. Chase Cunningham, former Principal Analyst at Forrester, and Brigadier General Greg Touhill, President, Appgate Federal
    Some of the biggest security blunders of 2020 were tied to the exploitation of VPNs. The limitations of this 25-year-old technology were exposed just as global mass remote workforce initiatives reached a fevered pitch. VPNs are not fit for purpose in a world where secure access is more important than ever.

    Watch our webinar to explore the four main pillars that are essential to the building and execution of a superior remote access strategy:
    1.Confront your VPN
    2.Develop your Roadmap
    3.Enforce Zero Trust Access
    4.Unleash Operations
  • Jumpstart Your Zero Trust Roadmap Ft. Forrester Recorded: Feb 10 2021 51 mins
    Jason Garbis, SVP of Product Management at Appgate and Dr. Chase Cunningham, VP Principal Analyst at Forrester
    Cybercriminals love the outdated “trust but verify” security model, because its vulnerability makes their exploits easy. Fortunately, a better approach is out there. The Zero Trust architecture shifts your security toward a “never trust, extensively verify” mindset—it’s the clear next step in achieving secure network access.

    However, achieving Zero Trust is not a simple one-and-done project. To truly reap the benefits of Zero Trust, your enterprise must implement a range of security protocols and strategies. This takes time to accomplish and figuring out those first steps to success can be difficult.

    This on-demand webinar covers everything you need to jumpstart your Zero Trust journey:
    •Making the case for Zero Trust
    •How to plot your journey
    •Why achieving Zero Trust starts with secure access
    •Understanding the NIST Zero Trust architecture
    •Exploring Zero Trust case studies
  • Building Blocks for Your Zero Trust Journey Recorded: Feb 5 2021 60 mins
    Jason Garbis, SVP of Product Management at Appgate and Jerry Chapman, Technical Director at Optiv
    Zero Trust can break down silos and transform your organization’s security posture, but knowing where to start can be challenging. This webinar will show you how to take the first steps to achieving Zero Trust. It starts with a Software-Defined Perimeter (SDP) solution that simplifies and strengthens access controls—and that’s just the beginning of the journey.

    We’ll cover:
    •An introduction to Zero Trust’s core concepts
    •What a typical enterprise Zero Trust journey looks like
    •How people, devices, networks, and workloads play into the Zero Trust paradigm
    •Why a Software-Defined Perimeter (SDP) is the proven approach to Zero Trust
  • How to Achieve Zero Trust in 2021 Ft. Forrester Recorded: Jan 29 2021 58 mins
    Dr. Chase Cunningham at Forrester, Jason Garbis at Appgate, Jalon Zimmerman at Secureworks, and Jeremy Oddo at Third Floor
    2020 finally obliterated the perimeter, reinforcing the need for Zero Trust access. Homes became satellite offices overnight, which broke standard security protocols and forced companies to re-evaluate their network access strategies.

    Now, months after that disruption, it’s clear those sudden changes are not going away. Remote work is here to stay, but legacy network security architectures are unable to secure and support the new reality. It’s time to replace a failing old models and solutions with Zero Trust network access.

    Watch our expert roundtable discussion for valuable insights and recommendations for embarking on your Zero Trust journey in 2021.
  • Unleash Digital Transformation with Zero Trust Security Recorded: Jan 29 2021 58 mins
    Jason Garbis, SVP of Product Management at Appgate, and
    Security should be an enabler, not an impediment—but this is a foreign concept to most enterprise organizations. That’s why Zero Trust represents such a paradigm shift in how we secure network access. Once you embrace the principles of Zero Trust , you can then unleash its transformative powers.

    In this joint webinar with CenturyLink, we discuss how Zero Trust can unlock digital transformation efforts while strengthening your security posture.

    We’ll cover:
    o The pillars of a secure digital business
    o Why legacy network security solutions need reconsidering
    o How Zero Trust and a Software-Defined Perimeter architecture unleash transformation potential
  • VPN vs SDP: Live Hack Demo Recorded: Jan 29 2021 40 mins
    Jim Anthony, VP of Cybersecurity at Appgate, and Neil Christie, Director of Cybersecurity Solutions Architecture at SageNet
    VPNs used to be the obvious choice for ensuring secure remote access. However, traditional VPNs no longer provide the security, performance and access control needed to effectively secure your enterprise. Organizations who understand the limitations of VPNs are switching to a Software-Defined Perimeter (SDP), because it exceeds their modern remote access needs and sets them on a clear path toward Zero Trust.

    Watch our webinar for an in-depth explanation of the architectural differences between VPN and SDP, and discover why enterprises are now seeking out robust SDP solutions to secure their data.
  • Simplify Secure Access in 2021 – Expert Roundtable Recorded: Jan 29 2021 56 mins
    Scott Crawford at 451 Research, Jason Garbis at Appgate, and Leo Taddero at Cyxtera Federal Group
    There’s no question that IT and access management is evolving—but its recent pace has been staggering. Pre-pandemic, many organizations were taking a long-term approach to implementing Zero Trust network access solutions, but a dramatic increase in remote work forced immediate change. As we move into 2021, organizations have an opportunity to regroup and determine how they can strengthen and simplify their network security architectures across the enterprise.

    Join our roundtable of experts as they address how organizations can simplify network security and streamline secure access. Our experts discuss:
    •The current state of IT and its trajectory
    •How the sudden shift to remote work became a catalyst for change
    •Exploring the ways organizations can modernize their secure access approach
Secure Access, with Confidence
Make sure the right people can access the right resources – and nothing more. With Appgate secure access solutions you can enable your digital business with a security strategy that reduces risk, removes complexity and instills the confidence needed to move forward.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Reduce Your Attack Surface with Zero Trust
  • Live at: Apr 27 2021 2:56 pm
  • Presented by: Jason Garbis, Author of Zero Trust Security Guide at Appgate, and Aaron Palermo, Co-author of SDP Architecture Guide at Optiv
  • From:
Your email has been sent.
or close