Featured
Cyber Risk Roundtable Ep. 4: Protecting OT Networks with Zero Trust Architecture
Robert Albach (Palo Alto Networks), Jeff Harrison (Verizon), Ashish Khanna (Verizon)
Zero Trust Architecture (ZTA) is a cybersecurity framework for prioritizing and managing cyber risk with the fundamental approach of “Never Trust, Always Verify”. While traction for ZTA began in IT environments, we are starting to see proliferation into Operational Technology (OT) use cases and even callouts within OT-specific standards and regulations. Still there are many asset owners and owners with questions on the suitability of ZTA for OT and best way to operationalize the frameworks.
Join Zero Trust and OT Security experts from Verizon and Palo Alto Networks to learn more about:
- The cybersecurity and regulatory trends driving ZTA adoption
- A 5-step approach for developing a Zero Trust Architecture
- Insights from real world assessments on why ZTA is needed
- How to implement change that is aligned with the needs of industrial environments
- Practical Zero Trust OT security use cases from the perimeter to the core industrial networks
- Use cases including third party remote access, visibility, network segmentation
- Key takeaways and lessons learned
All episodes
-
Cyber Risk Roundtable Ep.1: Demystifying SASE and Zero trust adoption
Gabriela Allen (Verizon), Jim Aull (Verizon), Jason Georgi (Palo Alto Networks)
Effectively securing access to sensitive public and private resources and enforce compliance from wherever users and devices are located is a tall task for businesses today. That's why organizations have begun to abandon the traditional appliance-based solutions that are no longer effective to meet the security requirements of the expanding security edge.
Instead, organizations are moving toward a more modern approach that utilizes SASE and Zero Trust Access methodologies to protect their critical resources from threats. As organizations are increasingly adopting both, they realize that the synergy of SASE and Zero Trust is more efficient.
Join this discussion with Verizon and Palo Alto Networks to learn how to adopt Zero Trust principles to secure remote workforces and cloud resources through the lens of SASE. Key takeaways include how to:
• Demystify SASE and Zero trust adoption
• Decipher the phased approach to SASE adoption
• Comprehend the basics of SASE adoption business case
• Elevate your security posture with SASE Integrated cloud controls -
Cyber Risk Roundtable Episode 2: Securing Private 5G for the Enterprise
Gabriela Allen (Verizon), Jude Fils-Aime (Verizon), Ken Urquhart (Zscaler), Ravi Krishna Annadanam (Verizon)
Securing Private 5G for the Enterprise. Your Quick Start Guide.
Are you ready to take advantage of a secured Private 5G network? Are you ready for fiber optic data speeds without the wires and near real-time communication between devices and workloads and simplification of your IP networks without sacrificing security? Join Verizon and Zscaler to learn how quickly you can set up secure Private 5G so you can focus on your high value use cases and get to ROI faster.
Get insights on:
- The cost benefits of semi-private 5G
- Advantages of Zero Trust cyber security
- How Private 5G as a managed service lowers Total Cost of Ownership (TCO) and complexity -
Cyber Risk Roundtable Ep. 3: Email Security. Defend Your Top Cyber Vulnerability
Michael Hansen (Check Point), Kory Jessen (Verizon)
According to Verizon’s 2023 Data Breach Investigations Report (DBIR), Email security compromises have doubled since Verizon started publishing the report 15 years ago, and 41% of breaches involve mail servers. Similarly, Dark Reading’s intelligence shows that 91% of attacks start with email, 46% of malicious downloads come from collaboration applications, and 86% of all malicious files are delivered via email. These alarming statistics necessitate a unique approach to protecting the inbox.
During this webinar, the experts at Verizon and Check Point will discuss how organizations can effectively secure their email and collaboration applications. Topics we will cover include:
- Instituting a prevention versus detection strategy
- The importance of conducting a risk assessment to identify gaps in email security
- Leveraging a cloud-based email security solution, versus legacy gateways like Proofpoint and Mimecast that sit outside of the cloud
- Ensuring your email security protects internal email as well as incoming and outgoing messages
- The growing necessity for communication and collaboration protection. Why DLP (Data Loss Prevention) is a must, especially for highly regulated organizations
- Incorporating email security as part of a complete cyber security platform protecting all attack vectors -
Cyber Risk Roundtable Ep. 4: Protecting OT Networks with Zero Trust Architecture
Robert Albach (Palo Alto Networks), Jeff Harrison (Verizon), Ashish Khanna (Verizon)
Zero Trust Architecture (ZTA) is a cybersecurity framework for prioritizing and managing cyber risk with the fundamental approach of “Never Trust, Always Verify”. While traction for ZTA began in IT environments, we are starting to see proliferation into Operational Technology (OT) use cases and even callouts within OT-specific standards and regulations. Still there are many asset owners and owners with questions on the suitability of ZTA for OT and best way to operationalize the frameworks.
Join Zero Trust and OT Security experts from Verizon and Palo Alto Networks to learn more about:
- The cybersecurity and regulatory trends driving ZTA adoption
- A 5-step approach for developing a Zero Trust Architecture
- Insights from real world assessments on why ZTA is needed
- How to implement change that is aligned with the needs of industrial environments
- Practical Zero Trust OT security use cases from the perimeter to the core industrial networks
- Use cases including third party remote access, visibility, network segmentation
- Key takeaways and lessons learned