Event Recording

Zero Trust in a World of Everything, Everyone, Everywhere, All at Once

Show description
Speaker
Francisco Gaspar
Lead CyberSecurity Architect
Francisco Gaspar
Francisco Gaspar is an engineer by training, CyberSecurity architect by trade and a "team player" by nature. With a genuine passion for raising awareness, he is an influential leader and...
View profile
Top related content
Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.
Event Recording
Paul Simmonds - From Network Protection to Data Security
Dec 18, 2018
"Zero Trust" is the latest security buzzword from the vendors marketing department; but what it actually means for you means should vary depending on your business requirements. Properly aligning security architecture to enable the business strategy of the organisation is the key to deliver a Zero Trust architecture. But the solution could be anything from implementing identity-aware firewalls to the extremes of "BeyondCorp"; Google's firewall-less global network when the security posture is identical whether you are in Starbucks or on the Google campus.
Event Recording
Dr. Torsten George - How Zero Trust is Creating a Game-Changing Security Experience
Dec 18, 2018
We got security wrong. Enterprise security is failing with two-thirds of organizations experiencing an average of five or more security breaches in the past two years, according to Forrester. Adding to the fervor is the impact of Cloud, Mobile, DevSecOps, Access. The entire experience of developing, deploying and protecting applications has forever changed. In today’s network perimeter-free world, organizations must adopt a Zero Trust Security model – and shift from ‘trust but verify; to assume users inside a network are no more trustworthy than those outside. And with the...
Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.
Event Recording
Reinventing the Network with Zero Trust to Stop External Network Attacks
May 11, 2022
I'm gonna start with a, a very quick introduction, just to make sure that we're on the same page. You may be thinking, oh, Phillip, come on, we, we know all this stuff, you don't have to talk about that, but it really set helps to set the stage as to how we can transform how we think about what has previously been complex, networking security for all use cases. In fact, so complex that we've always said, this cannot be managed by developers. It needs to be managed by dedicated networking securit...
Event Recording
The Path to Zero Trust by Securing Privileged Identities
May 11, 2022
Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on foundations that are essential across your cybersecurity strategy, delivering greater value from existing cyber investments. In this session, we will outline: Why protecting identities is fundamental to achieving Zero Trust Practical steps you can take NOW to secure your privileged identities The...
Event Recording
Henk Marsman: From Trust to Zero - Lessons from Halfway in a Large Enterprise Environment
Feb 18, 2021
Thank you very much. Yeah. I I'm gonna share some of the lessons that we ran into doing zero trust in the bank as introduced in the panel earlier, I'm responsible for the strategy and direction of access management for our workforce. I do that together, obviously with a team of managers and, and service owners. And if you look at the, the zero trust model, I'd like to start off with a brief discussion on that. I'm not gonna reiterate all the great content that I've already seen today. So a lot o...
Event Recording
Dragan Pendic - Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional
Dec 18, 2018
Businesses are more data-driven than ever, but inaccurate and manipulated information threatens to compromise the insights that companies rely on to plan, operate, and grow. Unverified digital resource is a new type of vulnerability - one that is  chronically overlooked by digital enterprises. With autonomous, data-driven decision making, the potential harm from unverified digital resources become an enterprise-level existential threat. And then, there's a wider cybersecurity aspect and how to address the following: - Data provenance verification - the history of data from its origin...
Event Recording
Scott Carlson - Just trust everyone and we will be fine, right?
May 11, 2017
Why can’t you simply trust your employees to do the right thing? What benefit to the business comes from technical security controls?  In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and reducing the attack surface can help.