events.uschamber.com Open in urlscan Pro
3.248.123.157  Public Scan

Submitted URL: http://click.uschamber.com/?qs=3a503f98c67b716362372527b4392a194c1eb8e778dee7961178d615da2263c0ff225ef95f236d24a32486a5fb6d...
Effective URL: https://events.uschamber.com/ZeroTrust?utm_medium=Email&utm_source=SFMC&utm_campaign=&utm_content=
Submission: On September 29 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Menu

NOW + NEXT: Zero Trust Architected Networks
 * Home
 * Speakers
 * Register
 * Watch Live



ZERO TRUST ARCHITECTED NETWORKS

Assume breach. It might be one of the most memorable pieces of cyber risk advice
following the December 2020 discovery of an ongoing supply chain attack by a
sophisticated threat actor, likely Russian in origin. If you are running these
software versions, assume breach and hunt for adversarial behavior. Full stop.
From the Security Teams to Chief Information Security Officers, we know that the
worries and concerns of significant business disruption from a cyberattack are
on the minds of many. But there is a better way for organizations to manage
security. That approach is zero trust. 

While the concepts of zero trust are not new, shifting away from trusted,
firewalled, or castled networks is unknown to most enterprises. Many
organizations are struggling to integrate these concepts in an information
technology modernization strategy focused on security. Zero trust architectures
assume that malicious actors are both within and outside the enterprise and that
security teams need to validate the connections between every user, device,
application, and dataset. In addition, organizations will migrate operations to
the cloud and employ automated endpoint detection and response (EDR)
capabilities. Cloud migration increases employee productivity by allowing secure
connections from anywhere, from any device, while EDR technologies reduce
potential business disruption by accelerating detection and response to
threats. 

In this panel discussion, our experts will talk about strategies to expedite the
adoption of zero-trust architectures. While they will not cover the waterfront,
panelists will focus on the highest value starting points for organizations to
mature their zero-trust architecture (ZTA) maturity. The conversation will focus
on identity, devices, networks, applications, and data as the foundational
pillars of ZTA. 
 



Click to unmute




WHERE

Return to the WATCH LIVE tab on the day of the event to view the program.

WHEN

Tuesday, September 28, 2021

1 PM - 2 PM ET




RESOURCES

 * IBM Security - Zero Trust Solutions and Services
 * Splunk - The Essential Guide to Zero Trust
 * BlackBerry - Using Zero Trust to Enable Secure Remote Access: A SANS
   Whitepaper
 * Federal Zero Trust Strategy
 * Zero Trust Maturity Model
 * NIST Special Publication 800-207, Zero Trust Architecture