Identity & Zero Trust Strategies Summit

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. This event promises a deep-dive into the world of digital identity management and the role of zero-trust principles and associated technologies.

Agenda

Agenda

09

October

11:00

Zero Trust: Improving the Conditional Access Experience

Conditional Access solutions are an important component of a zero-trust strategy, but organizations may not be fully embracing those capabilities due to some inherent challenges with enforcement. In this session, we’ll break down those challenges and discuss how to overcome them with a combined solution from Microsoft Entra ID and the Tanium XEM platform.

Mike Fiorina

Tanium, Field CIO

Mike Fiorina is the Field CIO for Tanium’s strategic partnership with Microsoft, focused on technical strategy and enablement. Mike has been with Tanium for over four years, and has spent most of that time serving as the field technical lead for Tanium’s integration with Microsoft’s portfolio. Mike spent the early portion of his career focused on datacenter infrastructure and systems management, with a recent emphasis on cloud and security architecture. He is based in the Boston area, spending his time cheering for the local sports teams, as well as chasing his dog & children around local hiking trails.

09

October

11:30

Zero Trust & The Flaming Sword of Justice

Security breaches pervade the headlines. What was seen as rare just a few years ago now seems to occupy the daily news cycle. Many data breaches are made possible by missteps and misconfigurations. Often, security issues are introduced into website authentication mechanisms, further compounding the security issues and enforcing bad behavior by the end users. Security debt and the associated shadow IT are a real problem for the vast majority of organizations, and attackers will use this to their advantage. In this session, you’ll learn about: Common causes of security breaches: Exploring how misconfigurations, missteps, and weaknesses in authentication mechanisms contribute to frequent data breaches and how they can be mitigated. The role of security debt and shadow IT: Discussing the growing problem of security debt and shadow IT within organizations, why they persist, and how attackers exploit these vulnerabilities. Strategies for strengthening authentication and reducing security risks: Providing practical solutions for enhancing authentication mechanisms, reducing security debt, and promoting better security behavior among users to minimize risks.

Dave Lewis

1Password, Global Advisory CISO

Dave has 30 years of experience in IT security operations and management and is the Global Advisory CISO at 1Password. He founded Liquidmatrix Security Digest and serves on the board of BSides Las Vegas. He has worked for Cisco, Akamai, AMD, IBM, and in critical infrastructure. Dave is a former DEFCON Goon and (ISC)² board member, and co-founded BSides Toronto. He contributes to Forbes, CSO Online, and more. In his free time, Dave plays bass, grills, and is a part owner of a whisky distillery and a soccer team.

09

October

12:00

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer you questions.

09

October

12:15

Journey to IT Ops Agility

Automox's 2024 State of IT Operations annual survey uncovered some interesting insights about how an IT organization's ability to rapidly respond to changing business requirements affects their ability to deliver quality services to users. Join us as we explore our findings!

Jason Kikta

Automox, CISO/SVP of Product

Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over twenty years in the United States Marine Corps. This included seven years at United States Cyber Command designing and managing the national counter-APT and counter-ransomware missions. Jason is also an adjunct lecturer at the Alperovitch Institute for Cybersecurity Studies at the Johns Hopkins University's School of Advanced International Studies in Washington, DC. Additionally, he is an adjunct Senior Technical Advisor to the Institute for Security and Technology in San Francisco, CA.

09

October

12:40

Security Outcomes powered by Identity

With today’s threat landscape, all security strategies must be Identity-first. Identity is becoming the primary control plane for ensuring secure access to resources while maintaining a zero-trust model. To do this effectively, organizations need to adopt a comprehensive, unified Identity security strategy that works in concert with existing security tools and covers use cases end-to-end: before, during, and after authentication. Watch this fireside chat with Jane Domboski, CISO at OneMain Financial, and Cory Musselman, CISO at Kyndryl, where we uncover how they are thinking about Identity as a key part of their security organization to:

  • Bring more context and visibility around Identity to make more informed decisions
  • Gain holistic control over Identity across users, applications, and infrastructure
  • Detect and response to potential Identity threats quickly and leverage automation

Matt Immler

Okta, Regional CSO

Matt has been with Okta since May 2017 as one of the original members of the Security Team and built the Auth0 Customer Trust function.

Jane Domboski

OneMain Financial, CISO

Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. Ms. Domboski is both an attorney and cybersecurity practitioner. She has served in both the public and private sectors. In the public sector, Ms. Domboski was an FBI Agent for over 20 years and she investigated cybercrime, cyber-terrorism, and cyber-espionage. Her private sector experience includes running the global Cyber Operations for SC Johnson and Cyber Strategy, Governance and Compliance for Deloitte Global.

Cory Musselman

Kyndryl, CISO

Cory Musselman is Senior Vice President and Global Chief Information Security Officer at Kyndryl, the world’s largest IT infrastructure services provider, supporting thousands of enterprise customers across more than 60 countries and 75 of the Fortune 100. Cory has 25 years of experience in cybersecurity and IT. Prior to joining Kyndryl, he worked in a variety of technical and leadership roles with companies in the US Defense Sector, most recently serving as the Vice President of Cybersecurity Operations at Leidos, where he was responsible for operational cybersecurity of Leidos and its hosted Government customers around the globe. He also led the largest cybersecurity program at Leidos in support of the Defense Information Systems Agency (DISA) and US Department of Defense (DoD). A native of Allentown, Pennsylvania, Cory current resides in Maryland, is a graduate of the University of Delaware where he received a BS in Computer Science. He is a member of the Executive Security Action Forum, a forum of cybersecurity executives from the Global 1000, and a member of the SANS CISO Network.

09

October

13:10

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer you questions.

09

October

13:20

Introducing 1Password Extended Access Management

Modern approaches to security like Zero Trust require that you trust nothing and verify everything. But traditional IAM falls short of meeting the fundamental tenets of zero trust when BYOD and unsanctioned apps are factored in.. Get an inside look at 1Password® Extended Access Management, the first and only solution that helps your business check that every identity is authentic, every application sign-on is secure, and every device is healthy - addressing the core tenants of Zero Trust. To learn more about 1Password Extended Access Management, contact our team here: https://1password.com/contact-sales/xam

09

October

13:40

Automox Platform Demo

Katherine Chipdey (Director, Solutions Engineering) provides a quick overview of the Automox product value and how we are helping customers with their pains when it comes to endpoint management. Through this product demo, she will show how you can achieve these results to reduce risk and save time with Automox.

09

October

14:00

Tanium: The Power of Certainty

Tanium’s XEM platform delivers complete, accurate, and real-time endpoint data regardless of scale and complexity. We’ve found that the best way to understand what we do is to show our automated platform in action; join us for a tour!

On-Demand

Session

[On-Demand] Introducing 1Password Extended Access Management

Modern approaches to security like Zero Trust require that you trust nothing and verify everything. But traditional IAM falls short of meeting the fundamental tenets of zero trust when BYOD and unsanctioned apps are factored in.. Get an inside look at 1Password® Extended Access Management, the first and only solution that helps your business check that every identity is authentic, every application sign-on is secure, and every device is healthy - addressing the core tenants of Zero Trust. To learn more about 1Password Extended Access Management, contact our team here: https://1password.com/contact-sales/xam

On-Demand

Session

[On-Demand] Automox Platform Demo

Katherine Chipdey (Director, Solutions Engineering) provides a quick overview of the Automox product value and how we are helping customers with their pains when it comes to endpoint management. Through this product demo, she will show how you can achieve these results to reduce risk and save time with Automox.

On-Demand

Session

[On-Demand] Tanium: The Power of Certainty

Tanium’s XEM platform delivers complete, accurate, and real-time endpoint data regardless of scale and complexity. We’ve found that the best way to understand what we do is to show our automated platform in action; join us for a tour!

Event Sponsors