Skip links

Zero Trust Roundtable

Zero Trust Roundtable

Our latest CISO Blend Webinar is here! Join Tim Bandos CISSP, CISA, CEH, Dr. Erdal Ozkaya, Raymond Comvalius, and Chaim Sanders for a Roundtable discussion on Zero Threat. Topics will include:

✅ What is Zero Trust and why is it an essential framework for security planning?
✅ Why is the term “Zero Trust” prone to misuse by vendors?
✅ What are the strategic considerations required for adoption of Zero Trust?
✅ How can you avoid the common pitfalls wrt rolling out a Zero Trust model?
✅ What are the cost implications to Zero Trust implementation/ administration/ maintenance?
✅ In a Zero Trust world: what does it mean GUILTY TILL PROVEN INNOCENT?


Date: May 11, 2023

Time: 12:00 p.m. CST

Register here

Zero Trust Roundtable is an online event that brings together top-level security experts to discuss the latest trends and best practices when it comes to zero trust security.

The security landscape is constantly changing, and staying ahead of the curve is essential. At this Zero Trust Roundtable event, top-level security experts will come together to share the latest information and best practices in the field of zero trust security. Attendees will learn about the potential risks and benefits of different security strategies, as well as an in-depth look into the latest trends in the zero trust security space. Learn from leading experts in the industry and stay up to date on the latest security innovations. Be sure to join us for this invaluable event, and take one step closer to staying ahead of the security curve.

Meet Your Host

Tim Bandos –Executive VP of Cybersecurity Services at Xcitium

Tim Bandos, is the Executive VP of Cybersecurity Services at Xcitium; delivering endpoint & network detection and response. An expert in incident response and threat hunting, he has over 18 years of experience in cybersecurity. Throughout his career, Bandos has expertly guided CISOs at major corporations on risk mitigation and cybersecurity best practices and has educated security professionals through speaking sessions at prestigious security conferences around the world, including RSA and Black Hat.

Dr. Erdal Ozkaya- CISO, Xcitium

Dr. Erdal Ozkaya is named among the Top 50 Technology Leaders by CIO Online & IDC. He is a Chief Cybersecurity Strategist and CISO at Xcitium (Comodo Cybersecurity), and a professor at Charles Sturt University. His expertise spans end-to-end IT solutions, management, communications, and innovation. He’s a well-known public speaker, an award-winning technical expert, author, and creator of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, CertNexus, and other expert-level vendors with an esteemed list of credits to his name. He is working with an ardent passion for raising cyber awareness and leveraging new, innovative approaches.

Raymond Comvalius- IT Infrastructure Architect

Raymond Comvalius is an independent IT architect and trainer from the Netherlands. He has been active in the IT industry for more than 30 years, of which 20 years were focused on Microsoft infrastructure products for both government and financial institutes. Raymond is the author of multiple books on Windows and security. As an architect, he supports organizations in IT strategy and realization of their next-generation workplace infrastructures. Raymond is actively involved with the national and international IT communities and has been a speaker at multiple international Microsoft events.

Chaim Sanders – Corporate Security Cloud Security

Chaim Sanders is an information security professional with practical experience building and leading security teams. With skills in software security, security testing, and development across several different industries including healthcare, financial, entertainment, and technology. Co-Lead and active committer of the OWASP Core Rule Set project.

Implementing Zero Trust

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The ‘Zero Trust’ model can play a critical role, but implementing it is a daunting task, and there’s no “one size fits all” approach to making the transition to a ‘Zero Trust’ architecture. This session provides a practical approach to adopting ‘zero trust’, outlining the strategy, the possibilities for leveraging existing investments, and the need for new investments. The session discusses:

  • Improved privileged access management using ‘Zero Trust’;
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • Essential steps for implementing ‘Zero Trust’ and stakeholder engagement
  • CISO’s Journey

Zero Trust Definition

zero trust security solution constantly evaluates trust every time a device or user requests access to a resource. This method prevents attackers from exploiting vulnerabilities in the perimeter to gain entry and then access confidential data and applications.

What are the 5 pillars of zero trust? – What is the zero trust approach? zero trust pricing bulletproof marriageeffective strategies to prevent