Featured
The State of Zero Trust Adoption as Cyber Threats Proliferate
Dr. Larry Ponemon, Chairman & Founder - Ponemon Institute | Samantha Mabey, Director of Digital Security Solutions - Entrust
Cyber threats are evolving. Cybercriminals are becoming more sophisticated. Breaches are on the rise. Organizations are having to mitigate an increasing number of threats while simultaneously trying to secure their environments that are not confined to any kind of traditional perimeter. While certain technology can help, an organization-wide implementation of a best practice strategy – like Zero Trust – is needed.
The recent 2024 State of Zero Trust & Encryption Study by Ponemon Institute breaks down exactly where organizations are on that journey to improving their resiliency and overall security posture.
Join us as we discuss the ever-changing threat landscape and how organizations are responding by adopting a Zero Trust strategy.
All episodes
-
Enterprise Strategy Group’s Zero Trust optimization roadmap
Jack Poller, Sr Analyst at Enterprise Strategy Group and Bhagwat Swaroop, President Digital Security Solutions at Entrust
Enterprise Strategy Group (ESG) helps advise on critical business decisions using their world-class research on Zero Trust network security. Their recent studies indicate that all too often, businesses don’t have an effective Zero Trust strategy.
In this exclusive Fireside Chat, ESG Senior Analyst and industry vet Jack Poller examines what Zero Trust optimization looks like in practice and what you need to know to get started. Topics covered include:
• The ZTNA maturity model
• Essential action items for CIOs and CISOs
• The role of crypto agility in enterprise Zero Trust projects
• And more of ESG’s independent research -
Zero Trust in 2023: Roundtable with ESG’s Analyst Mark Bowker
Mark Bowker, Sr Analyst at ESG, Anudeep Parhar, COO at Entrust and Chad Skipper, Global Security Technologist at VMware
Enterprise Strategy Group (ESG) is a global leader in unbiased market analysis, research, and strategy – and ESG’s recent research into Zero Trust has uncovered some uncomfortable facts.
In this panel discussion, ESG Senior Analyst Mark Bowker sits down with leaders from VMware and Entrust to answer key questions around Zero Trust this year – including:
• Why are we seeing a surge in Zero Trust projects now?
• Which vendor Zero Trust claims are true vs. false?
• How is the role of PKI changing in light of the move toward Zero Trust networks?
• What level of urgency should IT and infosec leaders put on being quantum-ready?
• And much more -
The Road to an Optimal Zero Trust Strategy
Rohan Ramesh, Product Marketing Management Director, Entrust & James LaPalme, VP & GM Identity Business Unit, Entrust
Disappearing perimeter, expanding attack surface, inevitable breaches, and the acceleration of digital transformation pose an increasingly complex challenge for organizations of all sizes. The Zero Trust framework provides a blueprint to secure data and networks in today’s multi-cloud environment, but the path to get there remains fragmented and challenging.
Join this session with CIO peers to discuss:
• Why establishing trusted identities across users, devices, apps, and workloads is critical to a strong foundation for an optimal Zero Trust strategy
• How to secure data in transit, at rest, and in use across public and private cloud environments
• How you can build a roadmap to implement an optimal Zero Trust framework for your organization, to protect against threats today and in a Post Quantum (PQ) future -
Secure Your Hybrid Workforce with Zero Trust
Rohan Ramesh, Product Marketing Management Director, Entrust & James LaPalme, VP & GM Identity Business Unit, Entrust
Organizations are operating in the most complex cybersecurity landscape we’ve ever seen. Sophisticated and determined attackers are the norm. With the continued rise in cyberattacks and increasing regulations for data and information security, organizations need to ensure employees (and contractors) can access resources from anywhere at any time in a secure yet frictionless manner. Zero Trust as a foundational framework has become key in securing access and ensuring compliance with various regulations and policies.
Join this session to learn:
• How to maximize security while minimizing friction with perimeter-less security and contextual awareness
• How to establish trusted identities across users, devices, apps, and workloads
• How to secure data with a PQ ready cryptography for data in-use, at-rest and in-transit across public and private cloud environments -
Understanding and Navigating the Challenges Associated with Zero Trust
Samantha Mabey, Director of Solution Marketing
Zero Trust has quickly shifted from a trending tech term to a best practice recommended by governments and regulatory bodies. While the “Never Trust, Always Verify” principle of Zero Trust may seem like a simple enough concept, putting a Zero Trust strategy into action can be more complex. A recent Foundry MarketPulse study found that while organizations are increasingly adopting Zero Trust, they are also encountering obstacles along the way. Join us for this webinar as we discuss those challenges, then outline the road to implementing Zero Trust and why it’s so critical for securing your organization today as well as against future threats such as post-quantum.
-
Achieving Zero Trust for Secure Data in the Cloud
Juan Asenjo, Director of Partner Marketing – Entrust and Julian Weinberger, Field CTO – ShardSecure
Organizations often struggle balancing their desire to store sensitive data in the cloud against the risk of having cloud admins, cloud providers, and third parties potentially accessing the data. Our webinar will examine a simple and transparent approach for achieving Zero Trust architecture in cloud environments without the complexity of traditional data security solutions. Our speakers will discuss how to fully realize the promise of Zero Trust in the cloud through not only the adoption of least privilege principles and strict access controls, but also the adoption of self-protecting data, the integration of data security and governance, and cryptographic agility.
Join the webinar and learn:
• How self-protecting data can protect you from different risks in the cloud
• Why robust key management is important to secure, encrypted data
• How to prepare for the threat presented by post-quantum computingThis webinar is for you if you are responsible for:
• Managing your organization’s Zero Trust architecture
• Overseeing your organization’s security best practices
• Auditing and ensuring your organizational compliance -
Converged Identity and Access Management – A Zero Trust Journey
Andrew Massi, Senior Digital Security Consultant, Entrust and Chris Ghantous, Global Director of Technical Solutions, Entrust
With the recent increase in cyber-attacks that involve the use of weak / compromised credentials, organizations must secure their environment and resources with a Zero Trust framework and phishing-resistant role-based access.
Today’s technology leaders must navigate different tools and methodologies yet remain confident they’re quantifying risk effectively. During this session we'll be discussing emerging digital security trends for state, local and educational organizations.Join this informative 30-minute webinar to learn:
• How to establish trust across users, devices, and apps that secure a first line of defense
• How to support the Zero Trust framework through the adoption of Phishing resistant passwordless authentication
• Establish trust through verifiable, phishing-resistant, certificate-based identities across users, devices and applications to implement a secure first line of defense against cyberattacks and false identities
• Efficiently and effectively comply with CJIS and other regulations so you can stay focused on today’s high-demand, high-threat environments -
The State of Zero Trust Adoption as Cyber Threats Proliferate
Dr. Larry Ponemon, Chairman & Founder - Ponemon Institute | Samantha Mabey, Director of Digital Security Solutions - Entrust
Cyber threats are evolving. Cybercriminals are becoming more sophisticated. Breaches are on the rise. Organizations are having to mitigate an increasing number of threats while simultaneously trying to secure their environments that are not confined to any kind of traditional perimeter. While certain technology can help, an organization-wide implementation of a best practice strategy – like Zero Trust – is needed.
The recent 2024 State of Zero Trust & Encryption Study by Ponemon Institute breaks down exactly where organizations are on that journey to improving their resiliency and overall security posture.
Join us as we discuss the ever-changing threat landscape and how organizations are responding by adopting a Zero Trust strategy.