As the pandemic threw new challenges for Chief Information Security Officers (CISOs) all over the world, the requirement for zero trust access became an imperative. The Continuous Adaptive Risk and Trust Assessment (CARTA) approach introduced by Gartner in 2017 framed principles to guide cybersecurity executives’ thinking on zero trust, but approaches from company to company, and tools from vendor to vendor vary widely.
In this moderated discussion, CISOs from several industries share their experiences, thoughts and best practices. They’ll talk about how they have sorted through VPNs, Secure Access Service Edge (SASE), Software-Defined Perimeter (SDP), and other tools and techniques to provide connectivity to the “everywhere workplace” of hybrid workers in a hybrid cloud environment. Attendees will have the opportunity to understand the common struggles these CISOs faced with user experience, latency, security deficiencies, cost and scalability.
Senior cybersecurity professionals will discuss why the requirement for zero trust access became an imperative as the pandemic changed the entire landscape.
Get Involved! Ask questions to the live expert CISO panelists to share concerns, ideas and get involved with the cybersecurity community.
Industry experts will discuss their experiences, intended plans, and exchange best practices for how to address third-party risk management and compliance.
As a technology executive in the financial sector, Brett spends much of his time building DevOps and SecOps that improve operations, safeguard company and client data, and ensure compliance with government cybersecurity regulations.
To achieve those goals, he is concentrated on building lean, high performing teams and motivating them to identify needed change then devise the methodologies required to achieve that change. As a transformative leader, he works closely with executive management and the board of directors to develop business and IT strategies that protect our assets, ensure customer satisfaction, and promote growth.
Prior to joining Edelman Financial, he was an executive with the FBI, serving in differing senior leadership roles in technology, where he designed and built a global operations technology group committed to helping law enforcement combat crime and terrorism. In that position, he oversaw hundreds of agents, scientists, technicians and others in developing technology and intelligence products to support national security and law enforcement world-wide.
Before that, he was Director of Information Technology for Harris Corp. (formerly Crucial Security) and was a software development and program manager for CSC (Computer Sciences Corporation).
Like most technologists, he is constantly seeking to learn and innovate, and welcome conversations and connections with others on the same path.
Rajiv is a Senior Transformational Executive with broad-based management consulting and information technology experience in healthcare, insurance and public sector verticals. He accelerates organizational performance by defining strategies that align IT with the business, and driving large scale program implementations, involving cross-functional, multi-vendor, multi-continent teams with multi-million dollar operating budgets. He is a collaborative business partner who builds, transforms, and motivates highly successful teams and leaders to exceed customer expectations.
Steven is a seasoned IT leader with extensive experience in IT Risk/Security Management, Cybersecurity, Privacy Management, Data Confidentiality, IT Regulatory Compliance (HIPAA Privacy/Security, PCI Security), Data Protection, IT Advisory, Enterprise Risk Management, Crisis Management, Business Resilience and Disaster Recovery. He has supported and led efforts across the healthcare, academic, financial, and government sectors.
John is a seasoned IT leader with demonstrable experience leading highly performing teams in 24x7x365 environments. He is an expert in enterprise architecture, telecommunications, information security, and metrics-based decision-making. He has a proven track record in leveraging IT Service Management to align IT services with the needs of business. John has extensive knowledge and experience in SLA management, performance optimization, capacity planning, and virtualization technologies. He collaborates and communicates effectively across all levels of an organization. 15+ years of experience in communications architecture design, PCI/ISO compliance, network operations management, and incident handling. Active TS/SCI Clearance.
Michael Riemer has over 38 years of IT and IT Security experience. He is a Certified Instructor on Firewall/Virtual Private Networking, Intrusion Detection/Prevention, SSL/VPN and Network Access Control disciplines from multiple vendors.
Michael has a deep level of experience in the IT industry. He spent 23 years with the U.S. Air Force working in Cyber Security and Intelligence. Some of his duties included Communications Security Officer for U.S. Armed Forces Europe, Superintendent of Communications Operations, Information Security Officer, Computer Security Officer, Information Management Officer and Special Consultant Liaison where he acted on behalf of the U.S. Air Force assisting in the development of a new Communications Support Software package that was to be used by Special Security Office Communications Centers worldwide.
After completing his time in the service, Michael became a contracting consultant in the Value-Added Reseller channel. Proficient in multiple network operating systems as well as a multitude of switching and routing manufacturers, Michael as held many certifications throughout his lengthy career. He assisted a major manufacturer with the development of a Security Assessment and Awareness Program. His efforts were instrumental in their receiving ISO certification. Reporting directly to the CIO, Michael also worked on developing a 1-3-5-year IT Strategy Plan, to include redundant “hot-site” data centers, Metropolitan Area Network, consolidation and centralization of host systems, standardization and automated imaging of user desktops, centralized management of network resources and asset management. Bringing together all of his experience to create a networking vision for the future.
Michael’s IT experiences include, Remote Access Security, Network Access Control, Security Assessments, Penetration Testing, Security Awareness Program Development, Desktop Support Services, Project Management, Computer Operations Instruction, Directory Services Management, Disaster Recovery and Business Continuity Planning, HIPPA, FDIC, Sarbanes-Oxley, and PCI-DSS compliance, as well as thousands of hours of hands-on implementation and trouble-shooting experience.
Having been employed by Juniper Networks for over 10 years, Pulse Secure for over 6 years, and now with Ivanti, Michael holds the position of Global Vice President, Office of the CTO. He is deeply knowledgeable on all products in the Security Solutions Group product portfolio with over 20,000 designs and installs to his credit.
This Web Briefing is organized for InfoSec and cybersecurity professional looking to expand their knowledge base and interact with fellow industry experts.
CyberConnect Web Briefings™ are a new format for online interaction with thought leaders, industry analysts and innovative solution providers. These panel discussions run 60-75 minutes and include an analyst briefing, live interactive discussions, audience Q&A and a review of potential solutions.
Each CyberConnect Web Briefing encourages interaction between the expert panelists and the audience. This moderated panel, and featured analyst, will take live questions asked during the discussion and provide key takeaways from subject matter experts. Register, attend, network with peers and get involved with the cybersecurity community.
All live attendees will receive a certificate of attendance after the Web Briefing. This certificate can be used to apply for your valid CPE credit.