Zero Trust: Building Your Security Mesh With All Star Players – Digital Nova Scotia – Leading Digital Industry
Loading Events

« All Events

Zero Trust: Building Your Security Mesh With All Star Players

June 30 @ 12:00 pm - 1:00 pm ADT

Being intelligent with identity is crucial to any security or IT project. Our webinar series is designed to look at identities in relation to the market hot topics, and provide you, with clear takeaways on what you need to do now.

As envisioned by NIST (SP 800-207), Zero Trust security models eliminate persistent trust and enforce continuous authentication, least privilege, and adaptive access control. This strategy also applies segmentation and micro-segmentation for secure access. A zero-trust approach is about constant visibility into who is doing what on your network. This ensures maximum control over network security and network access.

One thing analysts, enterprises, and customers alike can agree on is that the journey to Zero Trust must start with Identity and Privilege. But choosing the right technologies to incorporate into your security mesh can feel a little like choosing a team to play a baseball game without anyone playing together before. You have a finite amount of members you can have on your team and you want the best person for each position, but without practice you have no idea who that is. So how do you choose your winning team?

Much like baseball, you’d choose your team based on who works best together. You want your security stack to be cohesive and work together to achieve your security goals, such as a Zero Trust framework. There’s no denying it that many products on the market today do what they say, but it’s about working them together and smarter, not harder. If you haven’t created a solid game plan when it comes to your tech stack then you’re probably seeing one of these things:

  • No central visibility or context
  • Additional management overhead
  • Disconnected user workflows
  • Over provisioned users or unidentified gaps in access
  • Multiple accounts per use

Join our session with Ping Identity to understand how to find your star players and how you can maximize the value of each to help you ensure maximum control. A Zero Trust approach is about least privilege, efficiency, and constant and consistent visibility into who is doing what. Join this session to learn:

  • How to identify and choose your Technology Players
  • Where companies went wrong
  • Where companies got it right
  • How to build a case for Zero Trust

Meet the Presenters

Kevin Alexandra
Director, Technology Alliances

Kevin has over 15 years experience implementing IT security services and solutions across some of the world’s largest and most complex enterprise environments. As a BeyondTrust veteran, Kev has been involved in hundreds of deployments, projects with millions of endpoints, and a plethora of different use cases. He brings this relevant perspective to the Technical Alliances Program to ensure our technology integrations continue to bring value to our customers.

Aubrey Turner
Executive Advisor

Aubrey Turner has an extensive background in successfully delivering strategic, enterprise cyber security solutions to Fortune 1000 companies that address business problems, strengthens organizations, reduce risk and deliver positive business outcomes. Aubrey has demonstrated rapport and consensus building with key stakeholders. Additionally, he has proven leadership, communication, management, collaboration, and sales skills.

 

 

Register