The Zero Trust Access Approach: Leveling Up Multi-cloud and Hybrid IT Access and Aligning to Your Cybersecurity Programs
Recording Available: Thursday, October 08, 2020
Today’s businesses are significantly maximizing the potentials of cloud-based workforce mobility tools for improved productivity and more advanced workforce management. However, the increase of users, devices, and applications accessing outside the enterprise perimeter has resulted in a rise of cyberattacks and data breaches.
Fortunately, the Zero Trust access approach works well when it comes to multi-tenant secure access. This approach provides a unified and cloud-based service and eases the Hybrid-IT access, making it more manageable, secure, and efficient, while having an advanced threat mitigation program that is aligned with the company’s cybersecurity schemes.
In this LIVE Webcast, information security experts Mike Riemer (Pulse Secure) and Barlow Keener (Summit Ridge Group, LLC) will provide the audience with a comprehensive discussion of the Zero Trust access approach. Speakers, among other things, will discuss risk mitigation techniques and best practices to maximize the potentials of this important trend.
Some of the major topics that will be covered in this course are:
- The Zero Trust Access Approach: How It Works
- Multi-Cloud and Hybrid-IT Access
- Common Risks and Pitfalls
- Selecting an Efficient Cybersecurity Program
- Practical Tips and Strategies in Implementing the Zero Trust Approach
Summit Ridge Group, LLC
- Building ZTN into CIS Controls, NIST, FedRAMP, and ISO 27001 requirements
- Building ZTN into Compliance (Azure) settings
- Knowing the weak gaps of ZTN and addressing them in security documentation
- Security Gaps in ZTN resulting from Employee behaviors related to BYOD
- Educating CSOs regarding ZTN
Who Should Attend:
- Chief Information Officers
- Chief Information Security Officers
- VPs and Directors of IT
- Cloud Systems Administrators
- IT Administrators
- Cybersecurity Managers
- Security Monitoring Specialists
- Cyber Threat Investigators
Michael Riemer has over 36 years of IT and IT Security experience. He is a Certified Instructor on Firewall/Virtual Private Networking, Intrusion Detection/Prevention, SSL/VPN and Network Access Control disciplines. Michael’s IT experiences include, Remote Access Security, Network Access Control, Security Assessments, Penetration Testing, Security Awareness Program Development, Desktop Support Services, Project Management, Computer Operations Instruction, Directory Services Management, Disaster Recovery and Business Continuity Planning, HIPPA, FDIC, Sarbanes-Oxley, and PCI-DSS compliance, as well as thousands of hours of hands-on implementation and trouble-shooting experience.
Michael Riemer has over 36 years of IT and IT Security experience. He is a Certified Instructor on Firewall/Virtual Private …
Barlow Keener is a Managing Director at Summit Ridge Group and serves as its Chief Information Security Officer and its General Counsel. He has over 20 years of telecommunications, spectrum, Internet, and privacy law experience. Barlow is an Adjunct Lecturer at Boston University’s Questrom School of Business where he teaches “Online Privacy and Internet Law.” He is a member of the Georgia, Florida, and Massachusetts bar associations and earned an exam certification as CIPP/US or “Certified Information Privacy Professional”, from the IAPP (International Association of Privacy Professionals). He is also a Co-Chair of the Federal Communications Bar Association (FCBA) Wireless Committee and a member of the American Bar Association’s Forum on Communications Law.
Barlow Keener is a Managing Director at Summit Ridge Group and serves as its Chief Information Security Officer and its …
Print and review course materials
Method of Presentation:
General knowledge of cybersecurity
NY Category of CLE Credit:
Law Practice Management
Unlock All The Knowledge and Credit You Need
Leading Provider of Online Continuing Education
It's As Easy as 1, 2, 3
Get Your 1-Year All Access Pass For Only $199
About Pulse Secure
Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for our customers. Our suites and SaaS platform uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world. Over 24,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance. Learn more at www.pulsesecure.net.
About Summit Ridge Group, LLC
Summit Ridge Group provides expert witness and valuation services to companies and investors that are active in the Telecommunications, Media, and Technology (TMT) industries. We provide expert and strategic consulting focuses on valuation-related services in the mobile, satellite, television/radio, wireline, and data center sectors. Summit Ridge services also include privacy and cybersecurity expert witness and strategic consulting. Our projects involve high stakes transaction decisions, litigation support, or financial restructuring matters. We have provided our services to major law firms, government agencies, and publicly traded companies.