Identity & Zero Trust Strategies Summit

Zero Trust Strategies Summit

October 9, 2024 – Now on Demand

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. This event promises a deep-dive into the world of digital identity management and the role of zero-trust principles and associated technologies.

Watch on Demand

Zero Trust is more than a marketing buzzword. As defenders look to holistic approaches to securing corporate assets, the concept of ZTNA (Zero Trust Network Access) takes on added importance to help simplify and strengthen access controls for all users, devices and data.

Platinum Sponsor

Tanium for Zero Trust

Gold SponsorsOkta

1PasswordAutomox

Register for this event to join security leaders and CISOs as they participate in panel discussions and fireside chats to talk about the importance of identity verification and access management, supply chain risks when identity providers are compromised, regulatory compliance and zero-trust principles, and the future of Identity and Access Management (IAM) innovation.

time iconOctober 9, 2024 11:00

Zero Trust: Improving the Conditional Access Experience

Conditional Access solutions are an important component of a zero-trust strategy, but organizations may not be fully embracing those capabilities due to some inherent challenges with enforcement. In this session, we’ll break down those challenges and discuss how to overcome them with a combined solution from Microsoft Entra ID and the Tanium XEM platform.

speaker headshot

Mike Fiorina
Tanium, Field CIO

time iconOctober 9, 2024 11:30

Zero Trust & The Flaming Sword of Justice

Security breaches pervade the headlines. What was seen as rare just a few years ago now seems to occupy the daily news cycle. Many data breaches are made possible by missteps and misconfigurations. Often, security issues are introduced into website authentication mechanisms, further compounding the security issues and enforcing bad behavior by the end users. Security debt and the associated shadow IT are a real problem for the vast majority of organizations, and attackers will use this to their advantage. In this session, you’ll learn about: Common causes of security breaches: Exploring how misconfigurations, missteps, and weaknesses in authentication mechanisms contribute to frequent data breaches and how they can be mitigated. The role of security debt and shadow IT: Discussing the growing problem of security debt and shadow IT within organizations, why they persist, and how attackers exploit these vulnerabilities. Strategies for strengthening authentication and reducing security risks: Providing practical solutions for enhancing authentication mechanisms, reducing security debt, and promoting better security behavior among users to minimize risks.

speaker headshot

Dave Lewis
1Password, Global Advisory CISO

time iconOctober 9, 2024 12:00

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer you questions.

time iconOctober 9, 2024 12:15

Journey to IT Ops Agility

Automox's 2024 State of IT Operations annual survey uncovered some interesting insights about how an IT organization's ability to rapidly respond to changing business requirements affects their ability to deliver quality services to users. Join us as we explore our findings!

speaker headshot

Jason Kikta
Automox, CISO/SVP of Product

time iconOctober 9, 2024 12:40

Security Outcomes powered by Identity

With today’s threat landscape, all security strategies must be Identity-first. Identity is becoming the primary control plane for ensuring secure access to resources while maintaining a zero-trust model. To do this effectively, organizations need to adopt a comprehensive, unified Identity security strategy that works in concert with existing security tools and covers use cases end-to-end: before, during, and after authentication. Watch this fireside chat with Jane Domboski, CISO at OneMain Financial, and Cory Musselman, CISO at Kyndryl, where we uncover how they are thinking about Identity as a key part of their security organization to:

  • Bring more context and visibility around Identity to make more informed decisions
  • Gain holistic control over Identity across users, applications, and infrastructure
  • Detect and response to potential Identity threats quickly and leverage automation
speaker headshot

Matt Immler
Okta, Regional CSO

speaker headshot

Jane Domboski
OneMain Financial, CISO

speaker headshot

Cory Musselman
Kyndryl, CISO

time iconOctober 9, 2024 13:10

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer you questions.

time iconOctober 9, 2024 13:20

Introducing 1Password Extended Access Management

Modern approaches to security like Zero Trust require that you trust nothing and verify everything. But traditional IAM falls short of meeting the fundamental tenets of zero trust when BYOD and unsanctioned apps are factored in.. Get an inside look at 1Password® Extended Access Management, the first and only solution that helps your business check that every identity is authentic, every application sign-on is secure, and every device is healthy - addressing the core tenants of Zero Trust. To learn more about 1Password Extended Access Management, contact our team here: https://1password.com/contact-sales/xam

time iconOctober 9, 2024 13:40

Automox Platform Demo

Katherine Chipdey (Director, Solutions Engineering) provides a quick overview of the Automox product value and how we are helping customers with their pains when it comes to endpoint management. Through this product demo, she will show how you can achieve these results to reduce risk and save time with Automox.

time iconOctober 9, 2024 14:00

Tanium: The Power of Certainty

Tanium’s XEM platform delivers complete, accurate, and real-time endpoint data regardless of scale and complexity. We’ve found that the best way to understand what we do is to show our automated platform in action; join us for a tour!

Security leaders and CISOs will participate in panel discussions and fireside chats to talk about the importance of identity verification and access management, supply chain risks when identity providers are compromised, regulatory compliance and zero-trust principles, and the future of Identity and Access Management (IAM) innovation.

Key discussion topics:

  • Implementing zero-trust in diverse organizational environments.
  • Balancing user experience and shadow IT with robust security adopting zero-trust principles.
  • The role of AI and machine learning technologies in mitigating identity-based threats.
  • Zero Trust and regulatory compliance
    Venture capital investments and startup innovation.

Zero Trust is more than a marketing buzzword. As defenders look to holistic approaches to securing corporate assets, the concept of ZTNA (Zero Trust Network Access) takes on added importance to help simplify and strengthen access controls for all users, devices and data.

Participation as a sponsor allows you to be part of and engaging experience with participants and delegates that showcase your industry knowledge and solutions, while ensuring you reach a large audience.

This event is expected to attract more than 3,000 registered attendees. If you are looking to reach a large audience interested in Zero Trust, please Contact SecurityWeek for sponsorship information.

Event Details