Featured
The State of Zero Trust Adoption as Cyber Threats Proliferate
Dr. Larry Ponemon, Chairman & Founder - Ponemon Institute | Samantha Mabey, Director of Digital Security Solutions - Entrust
Cyber threats are evolving. Cybercriminals are becoming more sophisticated. Breaches are on the rise. Organizations are having to mitigate an increasing number of threats while simultaneously trying to secure their environments that are not confined to any kind of traditional perimeter. While certain technology can help, an organization-wide implementation of a best practice strategy – like Zero Trust – is needed.
The recent 2024 State of Zero Trust & Encryption Study by Ponemon Institute breaks down exactly where organizations are on that journey to improving their resiliency and overall security posture.
Join us as we discuss the ever-changing threat landscape and how organizations are responding by adopting a Zero Trust strategy.
All episodes
-
Why Should You Apply a Zero Trust Approach to Your Organization?
Emeka Okoye, Tech Sales Consultant, Entrust
Zero Trust is no longer a buzzword or a future-state security goal. We live in a world where people, employees and customers move seamlessly between physical and digital experiences. Just a few years ago, 30% of the world’s GDP was digitalized and it is predicted by the IDC that by the end of this year, it will change to more than 65%. With a connected and digital-first world comes a new set of threat vectors.
Organizations must ensure that their users and their devices are verified securely and seamlessly whether they are within or beyond its perimeter. An identity-centric approach with a Zero Trust framework can ensure stronger security for critical assets, creates a line of defense against costly breaches, and increases worker productivity.Join this Webinar, as part of our 4-part Webinar Zero Trust Series, to learn:
• How to adopt a Zero Trust mindset in your organization, including Zero Trust network access and identity-based segmentation.
• The three important elements of Zero Trust - users, machines, and core enterprise
• How to empower and secure people, employees, and customer -
Why Managing Machine Identities is Critical for a Zero Trust Framework
Samantha Mabey, Product Mktg Mgmt Director, Entrust
Moving to a Zero Trust framework is no longer something trendy you should consider for your digital ecosystem. It has become a best practice and a virtual necessity. Vast numbers of your users are working outside the traditional IT security perimeter protected with firewalls. But another reality when it comes to modern digital ecosystems is that machines now outnumber humans. Machines – from devices to applications – are collecting data, storing data, communicating with each other, and receiving commands from users in remote locations. In addition to securing those machines, effective management of machine identities is also essential to a Zero Trust framework — and it requires technologies that automate discovery, deployment, and lifecycle management of digital certificates across all enterprise use cases and vendor platforms.
- The definition of machine identities and how this category is evolving
- The risks associated with machine identities
- Why machine identity management is critical
- Key considerations for machine identities when it comes to implementing zero trust -
Zero Trust for Multi-Cloud Data Protection
Juan Asenjo, Director of Products & Partner Mktg, Entrust
As organizations migrate to multi-cloud environments to manage workloads in a more flexible and cost-effective manner, the number of credentials used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of these credentials enables organizations to apply consistent policies that strengthen security to protect critical data and facilitate regulatory compliance.
This session will examine the challenges faced by organizations managing centralized access credentials to support growing number of multi-cloud and hybrid deployments, how external certificate authorities, both public and private, are integrated and managed, and mitigation strategies to reduce risks associated with aggregation of sensitive assets. Our speakers will explain how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.
Join and learn:
- What challenges zero-trust faces in multi-cloud deployments
- Why protecting access credentials is critical for data security
- How centralized key management ensures consistent policy
- Where is a root of trust required for high assurance security -
Enterprise Strategy Group’s Zero Trust optimization roadmap
Jack Poller, Sr Analyst at Enterprise Strategy Group and Bhagwat Swaroop, President Digital Security Solutions at Entrust
Enterprise Strategy Group (ESG) helps advise on critical business decisions using their world-class research on Zero Trust network security. Their recent studies indicate that all too often, businesses don’t have an effective Zero Trust strategy.
In this exclusive Fireside Chat, ESG Senior Analyst and industry vet Jack Poller examines what Zero Trust optimization looks like in practice and what you need to know to get started. Topics covered include:
• The ZTNA maturity model
• Essential action items for CIOs and CISOs
• The role of crypto agility in enterprise Zero Trust projects
• And more of ESG’s independent research -
Zero Trust in 2023: Roundtable with ESG’s Analyst Mark Bowker
Mark Bowker, Sr Analyst at ESG, Anudeep Parhar, COO at Entrust and Chad Skipper, Global Security Technologist at VMware
Enterprise Strategy Group (ESG) is a global leader in unbiased market analysis, research, and strategy – and ESG’s recent research into Zero Trust has uncovered some uncomfortable facts.
In this panel discussion, ESG Senior Analyst Mark Bowker sits down with leaders from VMware and Entrust to answer key questions around Zero Trust this year – including:
• Why are we seeing a surge in Zero Trust projects now?
• Which vendor Zero Trust claims are true vs. false?
• How is the role of PKI changing in light of the move toward Zero Trust networks?
• What level of urgency should IT and infosec leaders put on being quantum-ready?
• And much more -
The Road to an Optimal Zero Trust Strategy
Rohan Ramesh, Product Marketing Management Director, Entrust & James LaPalme, VP & GM Identity Business Unit, Entrust
Disappearing perimeter, expanding attack surface, inevitable breaches, and the acceleration of digital transformation pose an increasingly complex challenge for organizations of all sizes. The Zero Trust framework provides a blueprint to secure data and networks in today’s multi-cloud environment, but the path to get there remains fragmented and challenging.
Join this session with CIO peers to discuss:
• Why establishing trusted identities across users, devices, apps, and workloads is critical to a strong foundation for an optimal Zero Trust strategy
• How to secure data in transit, at rest, and in use across public and private cloud environments
• How you can build a roadmap to implement an optimal Zero Trust framework for your organization, to protect against threats today and in a Post Quantum (PQ) future -
Secure Your Hybrid Workforce with Zero Trust
Rohan Ramesh, Product Marketing Management Director, Entrust & James LaPalme, VP & GM Identity Business Unit, Entrust
Organizations are operating in the most complex cybersecurity landscape we’ve ever seen. Sophisticated and determined attackers are the norm. With the continued rise in cyberattacks and increasing regulations for data and information security, organizations need to ensure employees (and contractors) can access resources from anywhere at any time in a secure yet frictionless manner. Zero Trust as a foundational framework has become key in securing access and ensuring compliance with various regulations and policies.
Join this session to learn:
• How to maximize security while minimizing friction with perimeter-less security and contextual awareness
• How to establish trusted identities across users, devices, apps, and workloads
• How to secure data with a PQ ready cryptography for data in-use, at-rest and in-transit across public and private cloud environments -
Understanding and Navigating the Challenges Associated with Zero Trust
Samantha Mabey, Director of Solution Marketing
Zero Trust has quickly shifted from a trending tech term to a best practice recommended by governments and regulatory bodies. While the “Never Trust, Always Verify” principle of Zero Trust may seem like a simple enough concept, putting a Zero Trust strategy into action can be more complex. A recent Foundry MarketPulse study found that while organizations are increasingly adopting Zero Trust, they are also encountering obstacles along the way. Join us for this webinar as we discuss those challenges, then outline the road to implementing Zero Trust and why it’s so critical for securing your organization today as well as against future threats such as post-quantum.
-
Achieving Zero Trust for Secure Data in the Cloud
Juan Asenjo, Director of Partner Marketing – Entrust and Julian Weinberger, Field CTO – ShardSecure
Organizations often struggle balancing their desire to store sensitive data in the cloud against the risk of having cloud admins, cloud providers, and third parties potentially accessing the data. Our webinar will examine a simple and transparent approach for achieving Zero Trust architecture in cloud environments without the complexity of traditional data security solutions. Our speakers will discuss how to fully realize the promise of Zero Trust in the cloud through not only the adoption of least privilege principles and strict access controls, but also the adoption of self-protecting data, the integration of data security and governance, and cryptographic agility.
Join the webinar and learn:
• How self-protecting data can protect you from different risks in the cloud
• Why robust key management is important to secure, encrypted data
• How to prepare for the threat presented by post-quantum computingThis webinar is for you if you are responsible for:
• Managing your organization’s Zero Trust architecture
• Overseeing your organization’s security best practices
• Auditing and ensuring your organizational compliance -
The State of Zero Trust Adoption as Cyber Threats Proliferate
Dr. Larry Ponemon, Chairman & Founder - Ponemon Institute | Samantha Mabey, Director of Digital Security Solutions - Entrust
Cyber threats are evolving. Cybercriminals are becoming more sophisticated. Breaches are on the rise. Organizations are having to mitigate an increasing number of threats while simultaneously trying to secure their environments that are not confined to any kind of traditional perimeter. While certain technology can help, an organization-wide implementation of a best practice strategy – like Zero Trust – is needed.
The recent 2024 State of Zero Trust & Encryption Study by Ponemon Institute breaks down exactly where organizations are on that journey to improving their resiliency and overall security posture.
Join us as we discuss the ever-changing threat landscape and how organizations are responding by adopting a Zero Trust strategy.