Attention:
Card image cap

The Zero Trust Approach: A Comprehensive Guide on Leveling Up Your Cybersecurity


Level: Intermediate
Runtime: 87 minutes
Recorded Date: May 24, 2022
Click here to share this program
Printer-Friendly Version
Closed Caption

Agenda

  • Overview of the “Zero Trust” Security Model
  • Increasing Endpoint Security Visibility and Control
  • Practical Tips and Strategies
  • Bolstering Cybersecurity with the Right Zero Trust Approach
  • Current and Emerging Trends

Runtime: 1 hour, 27 minutes
Recorded: May 24, 2022

For NY - Difficulty Level: For both newly admitted & experienced attorneys

For NY - Difficulty Level: Both newly admitted and experienced attorneys

Description

The looming threat of cloud and network security risk exposures has compelled organizations to actively bolster their data systems and cyber resiliency now more than ever. In response to the growing ineffectiveness of network perimeter defenses, businesses have increasingly turned to a “Zero-Trust approach” to strengthen defenses against sophisticated cyber-attacks. Zero-Trust is a rising security model that restricts access control to a wider environment by eliminating implicit trust, without sacrificing performance and user efficiency. In a recently issued executive order, President Biden endorsed Zero-Trust as the blueprint for a more secure future, mandating the security architecture for all governmental entities.
While these developments present opportunities for organizations to level up their cybersecurity programs, businesses should be aware of the unique considerations that come along with implementing a Zero Trust model.
Tune in as a panel of distinguished IT professionals, provide a comprehensive discussion of the Zero Trust approach. Speakers will offer practical tips and strategies appropriate for businesses to manage security threats.

This program was recorded on May 24th, 2022.

Provided By

Card image cap The Knowledge Group
Card image cap

Panelists

Card image cap

Carolyn Purwin Ryan

Partner, Data Privacy and Security Breach Coach
Mullen Coughlin

Carolyn Purwin Ryan is a Partner at Mullen Coughlin. She serves as breach counsel and provides third-party privacy defense legal services. She also aids clients in incident response planning, including tabletop exercises, assessment of regulatory compliance requirements and inquiries from regulators on both the state and federal levels. Ms. Ryan serves as a breach counsel to companies in various areas including healthcare institutions, construction companies, managed service providers, municipalities, professional services, retail, technology and financial institutions. She leads response investigations, guidance in governmental investigations, mitigation and restoration services. Ms. Ryan counsels clients on development of risk assessment policies, vendor agreement analysis and implementation of data privacy practices.
Carolyn was named a Pennsylvania “Rising Star” by Super Lawyers in 2018 and 2019.

Card image cap

Jason Short

Vice President of Product Management
Absolute Software

As Vice President of Product Management for Absolute Software, Jason plays a leading role in developing and executing the company’s product strategy and roadmap, and delivering innovative security and enterprise resilience solutions to end customers. Before joining Absolute, Jason spent nearly a decade in the security space, most recently serving as the Director of Product Management at Symantec. He’s also held management roles at Apple, 3Com, Celerity and BuilderMT. Jason has more than 15 years of experience in product development, management and engineering.

Card image cap

John Knopf

Senior Vice President Secure Access Product Management
Absolute Software

John Knopf joins Absolute as the Senior Vice President of Secure Access Product Management after leading the strategy and direction of the former NetMotion’s product portfolio since 2002. He has over 30 years of software industry experience with early-stage and mid-stage companies, and has led numerous products from inception to launch with commercial success. John has a Bachelor of Arts degree from Brigham Young University and was once shot in the chest by his father (we think accidentally, but the jury’s still out). Thankfully, it was a ricochet bullet and bounced off. Clearly, he survived.


Card image cap

Similar Courses

Card image cap
64 minutes
"I Am Not a Cat" Proceedings in a Virtual World
Besides becoming a pop-culture catchphrase, how has the shift to a virtual environment impacted proceedings over the last year, and what changes do you believe are here to stay? Our panel of experts will examine some of the greatest challenges, faux pas, and successes in virtual proceedings over the course of this transformative time.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
63 minutes
2021: The Year of the ELM
Panelists will clarify what constitutes an ELM platform, examine its unique and compelling capabilities, and discuss its strategic and tactical advantages, particularly those stemming from data-driven insights and machine-driven decision making. Attendees will gain a clear understanding of the significance of the emergence of ELM solutions, what firms and law departments can achieve with ELM platform, and practical and ethical considerations related to adopting an ELM solution.

Legalweek

$65

Add to Cart
Card image cap
118 minutes
A Comprehensive Guide on Non-Fungible Tokens (NFTs): Managing Potentials and Perils
In this program, a panel of thought leaders and practitioners assembled by The Knowledge Group will discuss the recent trends and significant challenges surrounding NFTs and the associated legal landscape, including helpful insights to avoid potential risks.">In this program, a panel of thought leaders and practitioners assembled by The Knowledge Group will discuss the recent trends and significant challenges surrounding NFTs and the associated legal landscape, including helpful insights to avoid potential risks.

The Knowledge Group

$165

Add to Cart
Card image cap
85 minutes
A Practical Guide in Drafting Data Privacy and Security Agreements: Mitigating Data Security Breach Risks
Listen as experienced data security attorneys Kenneth Dort (Faegre Drinker Biddle & Reath LLP) and Melissa Krasnow (VLP Law Group LLP) provide a comprehensive discussion of the latest trends, developments, and critical issues surrounding data privacy and security agreements. They will, among other things, offer practical tips and strategies for drafting these provisions in light of recent developments and the current legal landscape.

The Knowledge Group

$115

Add to Cart
Previous Next