Loading Events

« All Events

  • This event has passed.

Zero Trust – The Future of Enterprise Security

March 21, 2018 @ 12:00 pm - 2:00 pm

[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”s” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[column_1 width=”1/1″ last=”true” title=”” title_type=”” animation=”none” implicit=”true”]

[/column_1]

[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#af0303″ background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[blank h=”10″]

[/blank]

[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]

ABOUT

[/column_2]

[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]

DETAILS

[/column_2]

[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]

RSVP

[/column_2]

[column_2 width=”1/4″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

SPONSORS

[/column_2]

[/column_1]

[blank h=”30″]

[/blank]

[/column]

[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[blank h=”30″]

[/blank]

[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/2″]

[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

[push h=10]
ABOUT THE PROGRAM
Zero Trust – The Future of Enterprise Security is an exclusive two-hour event featuring an expert panel and an open room discussion in a private room at a 4 star restaurant. Our invitation-only group of 30 CISOs and security leaders will convene with three simple goals in mind:
[push h=10]

  • To learn from each other
  • To network with each other
  • To enjoy a fine lunch

[push h=10]
PHOTOS FROM THIS EVENT
[push h=10]
This event will feature an industry panel who will discuss lessons learned, experiences and recommendations in an informal fashion without recordings, press, or social media hampering our exchange of knowledge. Please see below for featured photos from this event:
[push h=10]

[/column_2]

[column_2 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[column_3 width=”1/1″ last=”true” title=”” title_type=”single” implicit=”true”]

[portfolio layout=”scrollable” nopaging=”false” column=”4″ max=”100″ title=”false” desc=”false” more=”” group=”true” cat=”032118-centrify-seattle” ids=”30795,30796,30799,30801,30803,30807″]

[/portfolio]

[/column_3]

[/column_2]

[blank h=”30″]

[/blank]

[/column_1]

[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#ededed” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/2″ last=”true”]

[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

[push h=10]
ABOUT THE CONTENT
Today’s sprawling workforce, mobile devices, and growing reliance on cloud infrastructure and applications play a critical role in why companies are moving away from a traditional, perimeter-based security approach. Instead it’s being replaced by a “Zero Trust” model with identity at its core. Zero Trust Security reduces the risk of breaches and enables business agility by dynamically securing access to enterprise resources through knowing the user, knowing their device, giving just enough access, while continuously learning and adapting without hampering access to the tools and information that workers need to get their jobs done.
[push h=10]
We’ll examine:
[push h=10]

  • Best practices for building Zero Trust Security
  • Key industry developments shaping the Identity Management market
  • Why verifying the user, verifying their device, and giving just enough access is an imperative
  • How to provide easy-to-configure access control and auditing solutions
  • Why two-factor authentication (2FA) is a must have
  • The increasing need to support hybrid environments especially for provisioning
  • Why identity analytics will be the norm for detection of malicious activity

[/column_2]

[/column_1]

[/column]

[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#f8f8f8″ background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[blank h=”25″]

[/blank]

[column_2 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/4″]

[column_3 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

MODERATOR
[push h=10]

[/column_3]

[column_3 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]


Bill MannBill Mann
Chief Product Officer
Centrify Corporation

[push h=10]

[push h=10]

[/column_3]

[/column_2]

[column_2 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”” class=”” id=”” title=”” title_type=”single” animation=”none” width=”3/4″ last=”true”]

[column_3 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

PANELISTS
[push h=10]

[/column_3]

[column_3 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]


Bruce LobreeBruce Lobree
Cyber Security Architect
Symetra Financial

[push h=10]

[push h=10]

[/column_3]

[column_3 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]


Tracey PretoriusTracey Pretorius
Director, Cybersecurity & Cloud Strategy, Issues Management
Microsoft

[push h=10]

[push h=10]

[/column_3]

[column_3 width=”1/3″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]


Sudharma ThikkavarapuSudharma Thikkavarapu
Head of Data & Application Security
T-Mobile

[push h=10]

[push h=10]

[/column_3]

[/column_2]

[blank h=”10″]

[/blank]

[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

[/column_2]

[/column_1]

[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#af0303″ background_image=”https://bdionline.com/wp-content/uploads/2017/06/RSVP-Opaque-Light.png” background_repeat=”no-repeat” background_position=”center center” background_size=”auto” background_attachment=”fixed” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[blank h=”30″]

[/blank]

[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

If you have received an invitation and would like to RSVP, or if you would like additional information and to be considered for participation, please email Stephanie Pereira Lima at stephanie.p.lima@bdionline.com. While there is no cost to participate, we require registrants to show up and actively contribute to the conversation.
[push h=20]

[/column_2]

[column_2 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]

DATE
Wednesday, March 21, 2018
[push h=10]
TIME
12:00 pm – 2:00 pm
[push h=10]
LOCATION
Seven Beef
1305 E Jefferson St., Seattle, WA 98122

[/column_2]

[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]

ATTENDEE PROFILE
30 CISOs and security leaders

[button id=”” style=”border” class=”” align=”left” link=”mailto:stephanie.p.lima@bdionline.com?subject=RSVP%20for%20the%2003%2F21%20Security%20Event%20in%20Seattle” linkTarget=”_self” bgColor=”accent7″ hover_color=”accent5″ font=”20″ icon=”” icon_placement=”left” icon_color=””]RSVP NOW[/button]

[/column_2]

[column_2 width=”2/5″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]

EVENT AGENDA:

12:00 PM – 12:30 PM Registration and Networking Lunch
12:30 PM – 1:15 PM Panel Discussion
1:15 PM – 2:00 PM Moderated Open Room Discussion Groups

[/column_2]

[blank h=”15″]

[/blank]

[/column_1]

[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]

[blank h=”75″]

[/blank]

[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]


SPONSOR

CentrifyLogo

Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company’s Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure. Centrify enables over 5,000 worldwide organizations, including over half the Fortune 50, to proactively secure their businesses from the inside out.

[push h=45]

ORGANIZER

BDI-Transparent

Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.

[/column_2]

[/column_1]

[/column]

Details

Date:
March 21, 2018
Time:
12:00 pm - 2:00 pm

Organizer

Business Development Institute (BDI)
Phone:
(212) 765-8358

Venue

Seven Beef
1305 E Jefferson Street
Seattle, WA 98122 United States
+ Google Map
Phone:
(206) 328-7090
Website:
http://www.sevenbeef.com/

The Adobe family of companies would like to keep you informed with personalized emails about products and services. See our Privacy Policy for more details.

Please contact me via email.

By clicking “Submit” I agree that I have read and accepted the Terms of Use.

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Adobe marketing and advertising practices I Adobe
Adobe marketing and advertising practices

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Legal
Legal Terms of Use for Adobe products & services