MegaCast By ActualTech Media Securing Your Network and Systems with a Zero Trust Architecture

Featuring

  • HPE Aruba Networking
  • Rubrik
  • Veeam
  • Gigamon
  • Illumio
  • Menlo Security

About This MegaCast

Adopting a Zero Trust architecture is increasingly recognized as a critical strategy for securing networks and systems in the face of evolving cyber threats. This MegaCast is tailored for IT professionals and managers aiming to implement or enhance Zero Trust frameworks within their organizations.

Participants will be introduced to the foundational principles of Zero Trust, including the importance of "never trust, always verify" and least privilege access. Sessions from leading security companies will cover practical approaches to apply these principles across various layers of IT infrastructure, from endpoints to networks to the cloud. Attendees will learn how to effectively deploy and manage Zero Trust architectures to bolster their security posture.

  1. Lindsay Kaye

    Guest Speaker Lindsay Kaye Vice President of Threat Intelligence, HUMAN Security

  2. John Spiegel

    Featuring John Spiegel Director of Network Transformation, Field CTO HPE Aruba Networking

  3. Jaye Tillson

    Featuring Jaye Tillson Director of Strategy (Field CTO) HPE Aruba Networking

  4. Joshua Stenhouse

    Featuring Joshua Stenhouse Director of Sales Engineering Rubrik

  5. Rick Vanover

    Featuring Rick Vanover Veeam Product Strategy, Office of the CTO Veeam

  6. Stephen Goudreault

    Featuring Stephen Goudreault Cloud Security Evangelist Gigamon

  7. Irish Spring

    Featuring Irish Spring Director, Americas Commercial & Partner Sales Engineering Illumio

  8. Negin Aminian

    Featuring Negin Aminian Senior Manager of Cybersecurity Strategy Menlo Security

  9. Victor Monga

    Featuring Victor Monga Senior Cyber Threat Consultant, EMEA Menlo Security

What You'll Learn

  1. Understand the core principles of Zero Trust security
  2. Learn practical applications for network and system security
  3. Discover how to move forward in the Zero Trust journey