Centrify and IDG Host SecurIT, the Zero Trust Summit for CIOs and CISOs
June 04, 2018
SANTA CLARA, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced SecurIT: the Zero Trust Summit for CIOs and CSOs, a complimentary one-day event that challenges the cybersecurity status quo and suggests a rethink of enterprise security around Zero Trust. The event, produced by CIO and CSO, will bring together IT and security executives and managers to understand the groundswell taking place around Zero Trust Security, and how this approach and its enabling technologies are improving enterprise security.
SecurIT attendees will get a complete crash course in Zero Trust Security, including what it is, why it matters, and tips on where to start. Targeting CIOs and CISOs, SecurIT offers an opportunity for cybersecurity practitioners of all levels to learn best practices and key insights from many contemporaries who are already implementing this new framework, and learn why it’s becoming critical to success in today’s increasingly-risky business environment. The event will also feature a keynote by Briggs Gladdius, a former Navy SEAL who will share lessons from the field on accomplishing the impossible, the importance of the team, why staying motivated along the way is critical – and how all of these approaches ultimately relate to Zero Trust.
As catastrophic data breaches become more common, the need for organizations to consider new approaches is escalating. Today’s leading attack vector continues to be weak or compromised credentials and, according to the 2018 Global State of Information Security Survey conducted by CIO, CSO and PwC, the number one source of security incidents is current employees. Hackers are no longer taking on billions of dollars worth of sophisticated technology to breach organizations, but rather are seeking to use the path of least resistance – identity – to gain access to sensitive data and privileged credentials. This increased threat explains why the concept of Zero Trust Security is gaining traction. Zero Trust is a recognized framework, developed by Forrester Research and also promoted by Google as BeyondCorp, whereby an organization doesn’t trust anything inside or outside the organization, and instead verifies anything and everything before granting access.
Confirmed keynote and session speakers include:
John Kindervag, Zero Trust founder and former analyst at Forrester Research
Dr. Chase Cunningham, Principal Analyst, Forrester Research
Tom Kemp, Chief Executive Officer, Centrify Corporation
Bob Bragdon, Publisher, CSO
Charlie Gero, CTO of Enterprise, Akamai
Todd Graham, Director, Security Strategy, Cisco
Jonathan Nguyen-Duy, Vice President, Strategy & Analytics, Fortinet
Abhilasha Bhargav-Spantzel, Principal Engineer, Intel
Garret Grajek, CISSP, VP, Identity, Cylance
Bill Mann, SVP, Products & Chief Product Officer, Centrify
Mark Hopkins, Information Security Operations Manager, YapStone
Kris Howitt, Director, Information Security Architecture, Live Nation Entertainment
Ruben Marquez, Manager, Information Security Projects, Live Nation Entertainment
Peter Smith, Founder & CEO, EdgeWise
To register, please visit http://securitidg.com/613sf/home
June 13, 2018
511 Harrison Street
San Francisco, CA 94105
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.