Zero Trust
Category

Zero Trust

Zero Trust Access: Five Steps to Securing the Extended Enterprise

Jaret Osborne - Duo Security  •   • 

Start this Session

Cyber Defense Approaches: What Are We Missing?

Moshe Ishai - HolistiCyber  •   • 

Start this Session

How Zero Trust Improves Cybersecurity

Markku Rossi - SSH Communications Security  •   • 

Start this Session

Addressing the Shift to an All Remote Workforce

Session In Development  • 

Dylan DeAnda - Tanium  •   • 

Preview this Session

Win The Cyberwar With Zero Trust

Session In Development  • 

John Kindervag - Palo Alto Networks  •   • 

Preview this Session

Pragmatic Zero Trust - Identity as the New Security Perimeter

Teju Shyamsundar - Okta  •   • 

Start this Session

Implementing a Zero Trust Security Model in an Untrusting World

General Gregory Touhill, Retired - Cyxtera Federal Group  •   • 

Start this Session

How to Implement the Zero Trust Security Model

General Gregory Touhill, Retired - Cyxtera Federal Group  •   • 

Start this Session

Session Contributors

Amanda Rogerson

Lead Healthcare Product Manager, Duo Security

Read Bio
Dylan DeAnda

VP, Enterprise Security, Tanium

Read Bio
General Gregory Touhill, Retired

First US CISO & President, Cyxtera Federal Group

Read Bio
Jack Koons

Chief Cybersecurity Strategist, Unisys

Read Bio
Jaret Osborne

Lead Solutions Engineer, Duo Security

Read Bio
John Kindervag

Field CTO, Palo Alto Networks

Read Bio
Markku Rossi

Chief Technology Officer, SSH Communications Security

Read Bio
Moshe Ishai

Co-Founder & General Manager, HolistiCyber

Read Bio
Teju Shyamsundar

Technical Manager, Product, Okta

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.