Zero Trust Roundtable
Our latest CISO Blend Webinar is here! Join Tim Bandos CISSP, CISA, CEH, Dr. Erdal Ozkaya, Raymond Comvalius, and Chaim Sanders for a Roundtable discussion on Zero Threat. Topics will include:
✅ What is Zero Trust and why is it an essential framework for security planning?
✅ Why is the term “Zero Trust” prone to misuse by vendors?
✅ What are the strategic considerations required for adoption of Zero Trust?
✅ How can you avoid the common pitfalls wrt rolling out a Zero Trust model?
✅ What are the cost implications to Zero Trust implementation/ administration/ maintenance?
✅ In a Zero Trust world: what does it mean GUILTY TILL PROVEN INNOCENT?
SAVE YOUR SPOT!
Date: May 11, 2023
Time: 12:00 p.m. CST
Zero Trust Roundtable is an online event that brings together top-level security experts to discuss the latest trends and best practices when it comes to zero trust security.
The security landscape is constantly changing, and staying ahead of the curve is essential. At this Zero Trust Roundtable event, top-level security experts will come together to share the latest information and best practices in the field of zero trust security. Attendees will learn about the potential risks and benefits of different security strategies, as well as an in-depth look into the latest trends in the zero trust security space. Learn from leading experts in the industry and stay up to date on the latest security innovations. Be sure to join us for this invaluable event, and take one step closer to staying ahead of the security curve.
Meet Your Host
Tim Bandos –Executive VP of Cybersecurity Services at Xcitium
Tim Bandos, is the Executive VP of Cybersecurity Services at Xcitium; delivering endpoint & network detection and response. An expert in incident response and threat hunting, he has over 18 years of experience in cybersecurity. Throughout his career, Bandos has expertly guided CISOs at major corporations on risk mitigation and cybersecurity best practices and has educated security professionals through speaking sessions at prestigious security conferences around the world, including RSA and Black Hat.
Dr. Erdal Ozkaya- CISO, Xcitium
Dr. Erdal Ozkaya is named among the Top 50 Technology Leaders by CIO Online & IDC. He is a Chief Cybersecurity Strategist and CISO at Xcitium (Comodo Cybersecurity), and a professor at Charles Sturt University. His expertise spans end-to-end IT solutions, management, communications, and innovation. He’s a well-known public speaker, an award-winning technical expert, author, and creator of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, CertNexus, and other expert-level vendors with an esteemed list of credits to his name. He is working with an ardent passion for raising cyber awareness and leveraging new, innovative approaches.
Raymond Comvalius- IT Infrastructure Architect
Raymond Comvalius is an independent IT architect and trainer from the Netherlands. He has been active in the IT industry for more than 30 years, of which 20 years were focused on Microsoft infrastructure products for both government and financial institutes. Raymond is the author of multiple books on Windows and security. As an architect, he supports organizations in IT strategy and realization of their next-generation workplace infrastructures. Raymond is actively involved with the national and international IT communities and has been a speaker at multiple international Microsoft events.
Chaim Sanders – Corporate Security Cloud Security
Chaim Sanders is an information security professional with practical experience building and leading security teams. With skills in software security, security testing, and development across several different industries including healthcare, financial, entertainment, and technology. Co-Lead and active committer of the OWASP Core Rule Set project.
Implementing Zero Trust
- Improved privileged access management using ‘Zero Trust’;
- Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
- Essential steps for implementing ‘Zero Trust’ and stakeholder engagement
- CISO’s Journey
Zero Trust Definition
A zero trust security solution constantly evaluates trust every time a device or user requests access to a resource. This method prevents attackers from exploiting vulnerabilities in the perimeter to gain entry and then access confidential data and applications.
What are the 5 pillars of zero trust? – What is the zero trust approach? zero trust pricing bulletproof marriageeffective strategies to prevent