Hi [[ session.user.profile.firstName ]]

Zero Trust: A Cybersecurity Essential and the Key to Success

In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated.

The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates.

That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.

Key takeaways:
•The security trends fueling the adoption of zero trust architectures
•The critical role that DNS security plays in successful zero trust implementation
•The key elements you need to have in place and the next steps for moving forward
Live online Apr 16 2:00 pm UTC
or after on demand 75 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Hill, Michael Zuckerman
Presentation preview: Zero Trust: A Cybersecurity Essential and the Key to Success
  • Channel
  • Channel profile
  • Avoiding the Security Pitfalls of Digital Transformation Jun 11 2020 2:00 pm UTC 75 mins
    Moderator: Dan Raywood
    According to Gartner: “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps and other business tools that were once on-premises are moving to the Cloud as a widely trusted alternative. Users can log in from anywhere and access all the information they need to conduct business on a daily basis.

    Office 365, for example, is now used by one in five corporate employees worldwide, making it the most widely used cloud service by user count. Clearly, businesses are undergoing journeys of digital transformation and moving to the cloud in huge numbers, but successful cloud adoption and implementation is not without its security challenges.

    This webinar will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies – including efficiency, agility and scalability – while avoiding the pitfalls.

    Key takeaways:
    · Why are existing security infrastructures inadequate for large-scale SaaS adoption?
    · How to reduce MPLS backhaul costs and increase internet bandwidth for users
    · How to maintain visibility and control over users’ traffic and protect against data exfiltration
  • How to Remotely Manage Secure File Transfers Amid COVID-19 and Beyond May 14 2020 2:00 pm UTC 75 mins
    Moderator: Michael Hill
    As the coronavirus (COVID19) pandemic continues to impact the world, it’s vital that organizations understand that it is not only health that’s currently at risk, but also the security of private data.

    At vulnerable times like these, hackers and cyber-criminals look to prey on as many people as they possibly can through a variety of fraud attempts. With organizations around the globe currently implementing remote working at unprecedented levels, it’s never been more vital for businesses to maintain secure and trusted remote file transfers to safeguard the sharing of data.

    In this webinar, we will explore the file and data collaboration risks and challenges impacting organizations during the COVID-19 pandemic, and outline best practices companies must adhere to in order to support their remote workforces and keep their vital information safe.

    Key takeaways:

    •Understand the file and data transfer risks impacting business during the COVID-19 pandemic
    •The importance of safe and secure file transfer management in remote working
    •How to remotely control file transfers and file processing
  • Why Remediation Needs to be Part of Your Vulnerability Management Program May 7 2020 2:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Chris Goetl
    Consistent headlines have been made for years about the latest and nastiest vulnerability – how bad it is, how vulnerable you are to it, and what an attacker of any sophistication can do to you via it if you don’t patch it fast enough. This has led to a movement to do continuous vulnerability management, where you are able to do more than scan your network, but remediate also.

    How can you bridge the gap between IT and operations to achieve a level of satisfactory security, to identify assets and ensure that the next zero-day doesn’t leave you feeling left behind? In this webinar we will look at ways to improve your continuous vulnerability management program.

    Key takeaways:

    How to reduce your time to patch, and patch in a 14 day cycle
    Understand how accurate your discovery and asset management program is
    Use efficient metrics to evaluate your vulnerability assessment and prioritization process
    Running an efficient testing process for patches
  • Using SIEM to Protect Against Top Cybersecurity Threats Apr 30 2020 2:00 pm UTC 75 mins
    Moderator: Dan Raywood
    There are countless ways that a businesses can make it easier for a threat actor to find their way in undetected – and the onus is on security to stop, detect and prevent the attacker from getting in the first place. This is where SIEM can enable a business, and ensure that aggregated and analyzed data and log records give you a clear picture of what is happening on your network.

    In this webinar, we will look at the most common ways that organizations unintentionally put themselves at risk against threats, understand how organizations can be better equipped to find these malicious instances and what solutions they can put in place to get a clearer picture of what is happening on your network.

    Key takeaways:

    Strategies for mitigating risk, from specific tools to employee education
    How to deploy SIEM effectively to highlight rogue incidents
    Automation techniques to deal with a shortage of security staff
    Spotting and dealing with misconfigurations and excessive access
  • How to Build a Program to Manage Your Third Parties and Supply Chain Apr 23 2020 5:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Dov Goldman, Heath Renfrow, Raef Meeuwisse
    Management of third parties – be they suppliers, vendors, providers or business partners – now needs to be an essential element of a company’s cybersecurity strategy. However, many companies do not know how to assess these suppliers, or what assessing a supplier actually involves.

    In this webinar, we will look at how to scale an actionable third party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture.

    Key takeaways:

    How to do supplier evaluation based on the inherent risk or criticality of each relationship
    Achieve transparency into suppliers’ security practices
    How to implement compensating internal controls when the suppliers don't have or will not reveal their own
    How to collaborate with suppliers to ensure success in the remediation process
    Be able to create KPIs to help manage, improve the process and demonstrate achievements
  • Zero Trust: A Cybersecurity Essential and the Key to Success Apr 16 2020 2:00 pm UTC 75 mins
    Michael Hill, Michael Zuckerman
    In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated.

    The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates.

    That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.

    Key takeaways:
    •The security trends fueling the adoption of zero trust architectures
    •The critical role that DNS security plays in successful zero trust implementation
    •The key elements you need to have in place and the next steps for moving forward
  • The Impact of #COVID19 on the Infosec Industry Apr 9 2020 2:00 pm UTC 75 mins
    Moderators: Dan Raywood and Michael Hill
    The highly-infectious coronavirus, or COVID-19, is spreading across the globe at an alarming rate, significantly impacting a vast array of sectors and verticals. The information security is no exception.

    As countries around the world attempt to slow the spread of the virus, one of the key strategies being implemented is ‘social distancing’ – reducing the amount of social interaction between people. As part of that, huge numbers of organizations have instigated mass working from home strategies for employees, opening up a vast array of security, operational and incident management risks as enterprises attempt to successfully shift to this unprecedented scale of remote working.

    At the same time, droves of tailored COVID-19 scams and cyber-attacks have sought to take advantage of the uncertainty and fear of the current situation, with cyber-criminals launching unprecedented levels of coronavirus-related phishing and malware attacks.

    In response, the information security industry has had to move quickly and innovatively to help support organizations and employees as this difficult time.

    In this webinar, Infosecurrity Magazine will be joined by a panel of security experts to discuss the various impacts that COVID-19 is having on the information security industry, asses the greatest risks currently threatening the security of data and reflect on what the sector must do to address the challenges being faced.
  • #IMOS20 Building Zero Trust Security Solutions Recorded: Mar 30 2020 30 mins
    Presenter: Michael Hill, Speaker- Wolfgang Goerlich, Advisory CISO, Duo Security
    Description :Whether it’s called ‘zero trust’ or ‘an initial step on the road to CARTA’ – we know the classic design patterns of security have to change.

    In this session, Infosecurity invites diamond sponsor Duo Security to discuss different strategies for building on the fundamentals of zero trust and working together with partners in stages to create better and more usable security.
  • #IMOS20 Ransomware Renaissance: The Threat that Won’t Quit Recorded: Mar 26 2020 61 mins
    Moderator: Dan Raywood, Speakers: Brian Honan, Rik Ferguson, Becky Pinkard
    Ransomware has been the bane of the information security industry for years, with some of the hardest hitting and most impactful cyber-attacks in history a result of this relentless foe.

    Traditionally, ransomware has been used by cyber-criminals to target the largest, most well-known private sector organizations in the world – and to dramatic effect.

    However, security experts have warned that this year could see large ransomware attacks change tact to target more companies in the public sector, a trend that began to surface in the latter stages on 2019. These organizations typically hold huge amounts of sensitive data, without the security sophistication to go with it.

    In this session, a panel of security experts will traverse the current state of the ransomware threat, highlight the real-life risks ransomware poses to organizations in both the private and public sectors and outline the best steps for effective ransomware defense.

    Key takeaways:
    •Gain detailed insight into the ransomware threat landscape in 2020
    •Learn the latest ransomware trends being adopted by attackers
    •Discover the best ransomware defense strategies for your organization
  • #IMOS20 How To: Manage Your Perimeter in an Ever-Connected World Recorded: Mar 26 2020 31 mins
    Moderator: Michael Hill, Speaker: Chris Hazelton
    Modern enterprises operate in vastly different ways than those of the past. What was once known as the on-premises ‘perimeter’ – the point where – was clearly defined and, one might say, straightforward to secure.

    However, organizations now function in a time of boundless connectivity, where vast amounts of devices enter and exit the building every day and employees use a combination of different internal and external infrastructures, resources and networks to maximize productivity.

    This has redefined the traditional security perimeter and forces modern organizations to shift their own understanding of where their data security boundaries actually start, and where they end.

    In this ‘How To’ session, a leading security expert will share practical insight and advice on how to define and secure your organization’s modern perimeter to keep your vital data safe
  • #IMOS20 The Evolution of Fraud: From the Simple to the Sophisticated Recorded: Mar 26 2020 59 mins
    Moderator: Dan Raywood - Speakers: Stephen Topliss, Chris Gerda, Adenike Cosgrove
    Fraud attempts date as far back as the year 300 BC, but today, fraud is not only at an all-time high, it is highly complex and sophisticated in nature.

    From business email compromise and click farms, to synthetic identities and omnichannel attacks, fraudsters now have an almost endless inventory of fraud tactics at their disposal, and each can cause significant impact on a business.

    In this session, a panel of speakers will explore the evolution of data fraud, assess the current fraud threat landscape, shine a light on a diverse range of fraud methods and share best organizational practices for defense.
  • #IMOS20 - Point Counterpoint Live! Recorded: Mar 26 2020 30 mins
    Moderator: Michael Hill Speakers: Tom Brennan, Chloe Messdaghi
    Two security leaders discuss the necessity of industry qualifications for career success in the information security sector, sharing high-level opinions, insight and key takeaways.
  • #IMOS20 - Making Smart Secure: Securing Future Tech Recorded: Mar 26 2020 61 mins
    Moderator: Dan Raywood, Speakers: Beau Woods, Mike Nelson
    This session will explore the current IoT threat landscape and the risks surrounding smart devices, address the real-world potential for harm and outline how to make smart secure for the future.
  • #IMOS20 - Election Hacking: Securing the Election to Protect Democracy Recorded: Mar 26 2020 61 mins
    Moderator: Michael Hill, Spearkers:Joseph Carson, Dave Klein, Ryan Clark
    In this session, a panel of experts will assess the real security risks surrounding the upcoming elections, highlight their potential impact and discuss how to ensure the safety of future voting processes, and democracy in general, across the globe.
  • #IMOS20 - How To: Do Security Hygiene on a Shoestring Recorded: Mar 25 2020 31 mins
    Moderator: Dan Raywood, Speaker: Lisa Ventura
    In this ‘How To’ session, a leading security expert will share practical insight and advice on how to best approach, implement and manage security hygiene in an organization without breaking the bank.
  • #IMOS20: Security at the Speed of Business: Keep Up or Get Left Behind Recorded: Mar 25 2020 60 mins
    Moderator:Stephen Pritchard, Speakers: Cate Pye, Malcolm Barske.
    In this session learn:
    •Why security teams must operate at the high speed of business innovation
    •What challenges security functions must overcome in the face of business advancement
    •How to maintain efficient security processed in a data-driven age
  • #IMOS20 Keynote Presentation:The Power of People in Cybersecurity Recorded: Mar 25 2020 29 mins
    Presenter: Michael Hill, Speaker: Lisa Forte
    In this keynote session, Lisa Forte will outline why the human element is now a central factor in all cybersecurity strategies. Forte will share awareness-raising best practices for effectively engaging with a workforce to put people at the heart of security communications and ensure that users are an organization’s strongest security asset.

    Key takeaways:

    Why people really have all the power in security strategies
    How to harness a positive cybersecurity culture
    Make your users your strongest security asset
  • #IMOS20- Combatting Burnout and Stress for Infosecurity Leaders: How to Keep Our Recorded: Mar 25 2020 63 mins
    Moderator: Dan Raywood, Speakers: Neil Shah, David Slade, Lizzy Higgins.
    Join a panel of experts as they discuss the reasons for and the impact of stress and burnout within security leadership roles, along with highlighting how to keep those in the industry supported and healthy.
  • #IMOS20 - Point Counterpoint Live! Recorded: Mar 25 2020 29 mins
    Moderator: Michael Hill, Speaker: Ed Tucker, Quentyn Taylor
    Two security leaders battle it out on the topic of cyber-warfare, sharing high-level opinions, insight and key takeaways.
  • #IMOS20- Phish for Thought: Combatting Modern Email Threats Recorded: Mar 25 2020 60 mins
    Moderator - Dan Raywood, Speakers - Stephen Murdoch, Lisa Forte, Richard Henderson
    In this session, a panel of security experts will explore the phishing threat landscape in 2020, assess recent advancements in attack methods and outline what businesses need to do to defend themselves against the dangers of email-based phishing attacks.
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust: A Cybersecurity Essential and the Key to Success
  • Live at: Apr 16 2020 2:00 pm
  • Presented by: Michael Hill, Michael Zuckerman
  • From:
Your email has been sent.
or close