Tuesday, January 23, 2024
Welcoming remarks

CRA SVP of Content Bill Brenner gives a preview of the day.

Bill Brenner
How to mitigate disruption while moving to zero-trust

If it's not done properly, switching to a zero-trust model can impede productivity, annoy staffers and negatively impact business. Here's how to make sure your zero-trust transition goes smoothly and creates minimal disruption.

Christine Owen
Breakout session #1 | How Malware Bypasses Endpoint Protection and How to Defend Against It

In a world where anyone can write successful malware or have AI generate it for them, there is still a way to protect.  Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

Danny Jenkins
Getting right with zero trust: A panel discussion

This panel discussion delves into the intricacies and challenges of implementing a zero-trust security model. The panel will explore key considerations, best practices, and real-world experiences in adopting and optimizing a zero-trust architecture. Experts will share insights on overcoming implementation hurdles, adapting to evolving threats, and ensuring a comprehensive security posture in an era where traditional network boundaries are no longer sufficient. The discussion aims to provide valuable perspectives for organizations looking to enhance their cybersecurity strategies with a zero-trust framework.

Julian Mihai Caleb Frazee
Breakout session #2 | How Malware Bypasses Endpoint Protection and How to Defend Against It

In a world where anyone can write successful malware or have AI generate it for them, there is still a way to protect.  Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

Danny Jenkins
Breakout Session 1B | Browser Security - The forgotten layer and the threat to zero-trust success

Browsers have become the primary gateway to information in both our personal and professional lives. Despite the browser’s crucial position at the center of our digital transactions, browser security has been neglected, the forgotten layer in an enterprise security stack. Browser security has now emerged as imperative to a security strategy based on zero trust access. This session dives into the key capabilities of browser security and how each pillar can drive organizations toward zero-trust success.

Negin Aminian
CRA Business Intelligence study takeaways: Zero trust

Join CRA Business Intelligence producers Bill Brenner and Daniel Thomas for a look at where security teams continue to struggle/succeed, and where respondents plan to make investments in the coming year.

Bill Brenner Daniel Thomas
Enabling Zero Trust in Healthcare: Insights from Julian Mihai, CISO at Penn Medicine

As cybersecurity threats continue to evolve, the healthcare industry faces unique challenges in safeguarding sensitive patient data. In this discussion, Julian Mihai, Chief Information Security Officer (CISO) at Penn Medicine, shares key insights into implementing Zero Trust Architecture (ZTA) to enhance cybersecurity in healthcare settings. Discussion points will include:

  • The importance of adopting a holistic approach, considering not only technological aspects but also organizational culture and user awareness.
  • The necessity of continuous authentication and authorization, ensuring that access to sensitive healthcare data is granted based on contextual information such as user behavior, device status, and location. 
  • The role of identity and access management (IAM) solutions in implementing and maintaining a Zero Trust framework effectively.
 
Closing remarks

A summary of the day's lessons

Bill Brenner