MEDIA ALERT: Centrify Brings SecurIT: The Zero Trust Summit for CIOs and CISOs to New York City in October 2018
September 17, 2018
SANTA CLARA, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced the second SecurIT: the Zero Trust Summit for CIOs and CSOs, in New York City on October 29-30. The invitation-only event, produced by CIO and CSO, will attract an audience of 400 of the most influential information technology, cybersecurity and business executives from mid-size to large companies across all industries. SecurIT is designed to educate IT and security executives on the groundswell taking place around Zero Trust Security, and how this groundbreaking approach is enabling technologies that improve access-based enterprise security.
WHAT: SecurIT attendees will gain up-to-the-minute knowledge of Zero Trust Security along with actionable insights they can put to work right away to answer critical questions about Zero Trust:
- Why is Zero Trust emerging as a signiﬁcant trend?
- How are organizations implementing Zero Trust Security?
- How does Zero Trust ﬁt within a broader IT and security strategy?
- What are the challenges in adopting Zero Trust?
- What’s Zero Trust’s role in compliance?
Attendees will hear from organizations already implementing this approach to secure the enterprise, and learn why it’s critical to success in today’s increasingly security-focused business environment.
WHY: As catastrophic data breaches become more common in a mobile-first, cloud-first world, organizations are realizing that the old perimeter-based way of securing the enterprise no longer works. The concept of Zero Trust is rapidly moving from interest to adoption, and organizations are adopting a “never trust, always verify” approach to stay ahead of the security curve. As attackers breach what’s left of enterprise perimeters, they are no longer hacking in but rather logging in, using compromised or weak credentials to look and act like trusted users and seek out more privileged access. All of which explains why Zero Trust Security is generating more interest from technology and security leaders than any other security technology, according to the 2018 IDG Security Priorities Study.
WHO: SecurIT is an invitation-only event for executives and other security decision-makers. Journalists can attend on October 30 only, and should request an invitation as soon as possible, as space is limited.
Confirmed keynote and session speakers include:
- Tony Scott, former Federal CIO for the U.S. Federal Government
- Opening Keynote: “Protecting Your Company and Your Customers from Cyber Attacks”
- John Kindervag, Zero Trust founder and former analyst at Forrester Research
- Keynote: “The Cyberwar: How Zero Trust Can Help”
- Dr. Chase Cunningham, Principal Analyst, Forrester Research
- Keynote: “What is Zero Trust, and Why Does it Matter?”
- Dr. Erroll G. Southers, Managing Director, Counter-Terrorism & Infrastructure Protection at TAL Global
- Closing Keynote
For more information, please visit www.ZeroTrustSummit.com.
WHEN: October 29-30, 2018
Grand Hyatt New York
109 East 42nd Street at Grand Central Terminal
New York, New York, USA, 10017
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to protect against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.