Tuesday, January 23, 2024 | |||
---|---|---|---|
Welcoming remarks | CRA SVP of Content Bill Brenner gives a preview of the day. | Bill Brenner - CyberRisk Alliance | |
How to mitigate disruption while moving to zero-trust | If it's not done properly, switching to a zero-trust model can impede productivity, annoy staffers and negatively impact business. Here's how to make sure your zero-trust transition goes smoothly and creates minimal disruption. | Christine Owen - Guidehouse | |
Breakout session #1 | How Malware Bypasses Endpoint Protection and How to Defend Against It | In a world where anyone can write successful malware or have AI generate it for them, there is still a way to protect. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine. | Danny Jenkins - ThreatLocker | |
Getting right with zero trust: A panel discussion | This panel discussion delves into the intricacies and challenges of implementing a zero-trust security model. The panel will explore key considerations, best practices, and real-world experiences in adopting and optimizing a zero-trust architecture. Experts will share insights on overcoming implementation hurdles, adapting to evolving threats, and ensuring a comprehensive security posture in an era where traditional network boundaries are no longer sufficient. The discussion aims to provide valuable perspectives for organizations looking to enhance their cybersecurity strategies with a zero-trust framework. | Julian Mihai - Penn Medicine, University of Pennsylvania Health System Caleb Frazee - Guidehouse | |
Breakout session #2 | How Malware Bypasses Endpoint Protection and How to Defend Against It | In a world where anyone can write successful malware or have AI generate it for them, there is still a way to protect. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine. | Danny Jenkins - ThreatLocker | |
Breakout Session 1B | Browser Security - The forgotten layer and the threat to zero-trust success | Browsers have become the primary gateway to information in both our personal and professional lives. Despite the browser’s crucial position at the center of our digital transactions, browser security has been neglected, the forgotten layer in an enterprise security stack. Browser security has now emerged as imperative to a security strategy based on zero trust access. This session dives into the key capabilities of browser security and how each pillar can drive organizations toward zero-trust success. | Negin Aminian - Menlo Security | |
CRA Business Intelligence study takeaways: Zero trust | Join CRA Business Intelligence producers Bill Brenner and Daniel Thomas for a look at where security teams continue to struggle/succeed, and where respondents plan to make investments in the coming year. | Bill Brenner - CyberRisk Alliance Daniel Thomas - CyberRisk Alliance | |
Enabling Zero Trust in Healthcare: Insights from Julian Mihai, CISO at Penn Medicine | As cybersecurity threats continue to evolve, the healthcare industry faces unique challenges in safeguarding sensitive patient data. In this discussion, Julian Mihai, Chief Information Security Officer (CISO) at Penn Medicine, shares key insights into implementing Zero Trust Architecture (ZTA) to enhance cybersecurity in healthcare settings. Discussion points will include:
| ||
Closing remarks | A summary of the day's lessons | Bill Brenner - CyberRisk Alliance |