"Demystifying Zero Trust, Simplifying Ransomware Protection"

Webinar Event

August 20, 2024, 9:00 am (PDT) / 12:00 pm (EDT)

Join us for an insightful webinar where we will unravel the complexities of Zero Trust Security and how it can protect you from ransomware and significantly boost your cybersecurity posture and compliance efforts.

Details:

  • We will be using GoToWebinar. Click HERE to register.
  • You can join our session by using a Mac, PC or a mobile device.

Agenda:

  • History of Zero Trust: Discover the origins and evolution of the Zero Trust model.
  • Misconceptions around Zero Trust: Debunk common myths and misunderstandings.
  • The Layers of a Zero Trust Cybersecurity Strategy: Explore the multi-faceted approach to implementing Zero Trust.
  • Applying the 80% / 20% Rule: Learn how to prioritize efforts effectively for maximum impact.
  • A Fool with a Tool, is Still a Fool: Understand why strategy is crucial, not just technology.
  • Reducing Operational Risk: Meeting Compliance if applicable (kill chain).
  • Start Your Zero Trust Journey: Understand why Zero Trust is now the de facto standard of cybersecurity best practices, supported by NIST guidelines.

Understand why Zero Trust is now the de facto standard of cybersecurity best practices, supported by NIST guidelines. The webinar will conclude with a panel discussion featuring industry experts from IP Services and Illumio, providing real-world insights and answering your questions.

The webinar will conclude with a panel discussion featuring industry experts from IP Services and Illumio, providing real-world insights and answering your questions. Don’t miss this opportunity to start your Zero Trust journey and enhance your organization’s security posture.

 

Location of event: 
GoTo Videoconference

Date of session:
Tuesday, August 20, 2024

Time of session:
9:00 am (PDT) / 12:00 pm (EDT)

Abstract:  
Demystifying Zero Trust Security - Supercharging Your Compliance Efforts!

Presented by:

Scott Alldridge is a technologist with a Bachelor's degree in Business Management, along with numerous highly recognized technology and cybersecurity certifications, including being a Certified Chief Information Security Officer (CCISO). He is a founding member and President of the IT Process Institute (ITPI), an organization dedicated to IT standards research, prescriptive guidance, and benchmarking. Scott is also among a select group certified in ITIL (IT Infrastructure Library) processes and standards.

With over 30 years of experience in Information Technology and Cybersecurity, Scott has authored several white papers and articles and produced and contributed to several IT books published by ITPI. His notable works include the Visible Ops Series of Handbooks on IT Best Practices and Security, which have sold over 400,000 copies.

Scott was one of the first adopters of ITIL, driving world-class service management deliverables for IP Services. His expertise has made him a sought-after guest speaker, including keynote addresses at the Healthcare Information and Management Systems Society (HIMMS) - Cyber Privacy & Security Forums, SysAdmin, Audit, Network and Security (SANS) - Cybersecurity Summits, along with keynoting at various Financial Services Conferences and other industries.

Scott provides strategic leadership for IP Services, enhancing company profitability and expanding its regional and national presence. He has a proven track record in recruiting highly skilled individuals and managing technical and cybersecurity teams. His teams deliver world-class service management and cybersecurity solutions to both the Enterprise and SMB companies across the United States. His extensive technical accomplishments and industry certifications reinforce his role as a leading figure in thought leadership for IT and cybersecurity providing practical and pragmatic prescriptive guidance to the technology industry.

Russell is a Field CTO with Illumio, a leader in network segmentation, where he helps large and complex organizations successfully delivery Zero Trust and segmentations programs. His background in networking and security goes back nearly 3 decades, working in Technology, Pharmaceutical, Energy and Telecoms but with specific focus in Payments and Banking where he has worked for, and with many of the globe’s largest banks from North America, Europe, Asia and Australia.