CISO Perspectives: Zero Trust-As-A-Service
Alleviating Security Challenges
Gain perspective on: The shift in security challenges, current security concerns, and future challenges; Main components of Zero Trust-as-a-Service; Zero Trust-as-a-Service implementation and deployment best practice; How Zero Trust-as-a-Service solving security challenges in a hybrid IT environment
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand
With users and applications moving to cloud-first operations, a cloud-based Zero Trust access solution is critical in securing corporate resources.
The virtualization of computing, software defined storage, and networking has given birth to hyperconverged infrastructures. Implicit trust is gone and has made way for a more effective practice- explicit identity-based trust.
The rapid shift to work-from-home has accelerated the adoption of Zero Trust frameworks. Zero Trust-as-a-Service will be a necessary component of security strategies for 2021 and beyond.
Join Pulse Secure’s Global Chief Security Architect and industry veteran Kayne McGladrey in this webcast to learn about:
- The shift in security challenges, current security concerns, and potential challenges in the future
- Main components of Zero Trust-as-a-Service
- How Zero Trust-as-a-Service solves security challenges in a hybrid IT environment
- Zero Trust-as-a-Service implementation and deployment considerations
- How Zero Trust security practices can help you prepare and build a business continuity plan that withstands the unexpected and future security concerns
Presenters:
Mike Riemer
Global Chief Security Architect
Pulse Secure
Michael Riemer has over 36 years of IT and IT Security experience. He is a Certified Instructor on Firewall/Virtual Private Networking, Intrusion Detection/Prevention, SSL/VPN and Network Access Control disciplines. Michael’s IT experiences include, Remote Access Security, Network Access Control, Security Assessments, Penetration Testing, Security Awareness Program Development, Desktop Support Services, Project Management, Computer Operations Instruction, Directory Services Management, Disaster Recovery and Business Continuity Planning, HIPPA, FDIC, Sarbanes-Oxley, and PCI-DSS compliance, as well as thousands of hours of hands-on implementation and trouble-shooting experience.
Having been employed by Juniper Networks for over 10 years, and now with Pulse Secure for the last 5 years, Michael holds the position of Global Chief Security Architect. He is deeply knowledgeable on all products in the Pulse Secure product portfolio with over 15,000 designs and installs to his credit.
Kayne McGladrey, CISSP is a senior member of the IEEE. In his 20+ year career, he has worked with company leadership at numerous Fortune 500 and Global 1000 companies in developing and implementing effective policies to reduce cyber threat. He's also the go-to person for multiple media outlets and a spokesperson for IEEE’s Public Visibility Initiative.
The modern company has an implicit social contract to protect the data entrusted to it. As a cybersecurity professional, his role is to advise companies on how to uphold that social contract by managing risks and deterring and denying threat actors. His consultative approach is the result of decades of experience working with Fortune 500 and Global 1000 companies.
The ability to fluently speak the languages of both business and technology and effectively communicate complex concepts to non-technical audiences has not only facilitated conversation with company leadership in developing and implementing effective policies to reduce cyber threat, it has made him the go-to person for multiple media outlets and a spokesperson for IEEE’s Public Visibility Initiative.
One of his career priorities is to inspire under-represented communities to pursue careers in cybersecurity. Talent is not limited by geography or background. Because he looks beyond the usual circles for talent, trust their abilities, and has an eagerness to help people succeed, he has been able to build effective teams despite the continued challenges of low unemployment in cybersecurity careers.
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand