English

Centrify Cyber Intelligence Tour Empowers Organizations with Zero Trust Security

Multi-City Executive Roadshow Provides Expert Updates on Cyber Threats and Attainable Solutions to Stop the Breach with Next-Gen Access

April 05, 2018

Santa Clara, CA Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced a multi-city series of non-classified congressional briefings in partnership with the Institute for Critical Infrastructure Technology (ICIT). The invitation-only briefings will offer attendees research on the top threats facing their organizations and information about how to protect valuable corporate data against unauthorized access, disclosure or misuse — especially as threats from cyber criminals grow in scale. The event series began in Chicago on March 21 and now moves to San Francisco, Dallas, Boston, and Atlanta with more to follow.

“High-profile breaches over the past year profoundly illustrated that the status quo is not working. The common denominator across the Yahoo, Equifax and Uber breaches was compromised identity,” said Rhonda Shantz, chief marketing officer at Centrify. “Bringing together the nation’s most authoritative cyber experts to discuss the true looming threats and how Zero Trust Security is attainable today will enable CISOs to better position their organizations in mitigating these attacks.”

James Scott – ICIT Sr. Fellow, best-selling author, and senior cyber warfare and national security advisor to Congress, NATO, the Pentagon, and the U.S. intelligence community — will share a non-classified congressional briefing on the global onslaught of security threats to private sector companies. His session will highlight topics including mercenary profiles, current and proposed legislation, nation state corporate espionage and election integrity.

“Nation state and cyber mercenary adversaries are becoming more sophisticated and more bold with their attacks on America's private and public sector. We need to reshape the way we think about cybersecurity and instead of being an afterthought, we need security by design, threat hunting and more potent layers of security woven throughout the labyrinth of the organizational IoT microcosm" said Scott. "This series of briefings with Centrify will inform senior security strategists where the threats are coming from and in what variations, as well as what is being discussed in Congress and the federal agency space when it comes to cyber warfare, and digital influence operations that can impact organizations and cybersecurity.”

Featured speaker and Zero Trust expert, Dr. Chase Cunningham, a principal security analyst at Forrester Research, will also provide his expertise related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation.

“Any organization considering a Zero Trust security strategy should also consider the application and use of next-generation access (NGA) technology,” wrote Cunningham. “Focusing solely on the network or data leaves gaping holes in security controls and will ultimately fail to fulfill any strategic security goals, much less a Zero Trust approach. NGA technologies enable better insight and better situational awareness of who is doing what in a network and enforce the policies that should be in place for data access, all key components of a Zero Trust strategy1.”

The rise of new legislation such as the Graham-Klobuchar Amendment, the Cyber Shield Act and the Paper Act is igniting a national dialogue around empowering private and public sector companies to secure their organizations and protect their employees, customers, and partners. Centrify delivers Zero Trust Security through the power of Next-Gen Access by verifying every user, validating their devices, and limiting access and privilege. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).

C-level executives interested in receiving an invitation to upcoming Centrify Cyber Intelligence Tour events can contact Centrify at [email protected].

To learn more about Centrify Zero Trust Security, click here.

1Blog postNext-Generation Access and Zero Trust,” Chase Cunningham, Forrester Research, Inc., March 27, 2018

 

###

About Centrify

Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.

Centrify is a registered trademark of Centrify Corporation in the United States and other countries.  All other trademarks are the property of their respective owners.