EcoCast By ActualTech Media Toward Zero Trust: Key Tools and Strategies to Accelerate Your Security Journey

Featuring

  • Ping Identity
  • Okta
  • Progress Software
  • Apono

About This EcoCast

In an era when perimeter-based defense is no longer sufficient, transitioning to a robust identity-centric model is the only way to safeguard critical assets. This EcoCast explores the practical frameworks and emerging technologies necessary to move beyond the hype and achieve a functional security posture.

We will examine how modern identity and access management, micro-segmentation, and automated policy enforcement work together to eliminate implicit trust. You will gain insight into the latest tools designed to streamline this migration without disrupting existing workflows or productivity. By focusing on interoperable solutions and high-impact strategies, this session provides a roadmap for reducing your organization's attack surface.

Join us to discover how to orchestrate a layered defense that verifies every user and device, ensuring your infrastructure remains resilient against sophisticated threats through the continuous application of least-privileged access.

  1. Lindsay Kaye

    Featuring Lindsay Kaye Vice President of Threat Intelligence, HUMAN Security and Author Future B2B

  2. Mark Wilson

    Featuring Mark Wilson Product Management Director Ping Identity

  3. Jen Toscano

    Featuring Jen Toscano Product and Solutions Marketing Director Ping Identity

  4. Maziel Martinez

    Featuring Maziel Martinez Staff Product Marketing Manager, Identity Management Okta

  5. Ariel Zommer

    Featuring Ariel Zommer Staff Product Marketing Manager, Security Okta

  6. Kurt Jung

    Featuring Kurt Jung Senior Product Manager Progress Software

  7. Ofir Stein

    Featuring Ofir Stein Co-Founder and CTO Apono

What You'll Learn

  1. Evaluate cutting-edge tools designed to automate your organization's access control policies
  2. Discover innovative solutions that simplify the implementation of micro-segmentation across networks
  3. Identify specific strategies to accelerate your transition toward a mature security model