Zero Trust Summit
Virtual Summit February 22 - 23, 2022
Zero trust: It is the security model of choice for enterprises looking to up their game and change the relationship dynamic between attackers and defenders … and it's also a top marketing buzzword. In the 2022 Zero Trust Summit, thought leaders seek to cut past the hype and get straight to the latest insight, use cases and best practices on how the zero trust model is being deployed as a pre-condition to operating a safe and secure IT environment, regardless of enterprise size and sector.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Grant Schneider
Senior Director for Cybersecurity Services
Venable LLP
Prior to Venable, Schneider served as the U.S. deputy federal CISO and the U.S. federal CISO and as senior director for cybersecurity policy on the White House National Security Council. Before that, he served for seven years as chief information...
Richard Bird
Chief Product Officer
SecZetta
Richard Bird is an internationally recognized identity-centric security expert who has been a CIO and CISO and the global head of identity management for JPMorgan Chase. Now, he is chief customer information officer for Ping Identity. Bird religiously believes that...
Tom FIeld
SVP, Editorial
ISMG
Ian Farquhar
Field CTO
Gigamon
Ian has worked in IT security for 30 years. At Gigamon he is Field CTO (Global), and also leads the Security Architecture Team. The SAT assists customers worldwide in high complexity security designs and operational capabilities, including incident response and...
Will Ackerly
CTO & Co-Founder
Virtru
Will is the CTO and Co-Founder of Virtru. Prior to founding Virtru, Will spent eight years at the National Security Agency (NSA) where he specialized in cloud analytics and security architecture—specifically protecting the agency’s in-house data transfers. During his tenure...
David Mahdi
CISO / CSO Executive Management
Sectigo
David Mahdi is Chief Strategy Officer and CISO Advisor at Sectigo. In his role, David leads the company’s overall strategy, direction, and M&A efforts to expand its leadership in the digital trust space. With 20+ years of experience in IT...
Dr. Chase Cunnigham
Chief Strategy Officer (CSO)
Ericom Software
Dr. Chase Cunningham, aka the Doctor of Zero Trust, is a recipient of Security magazine’s Most Influential People in Security and is currently Ericom’s chief strategy officer. In this role, he shapes the company’s strategic vision, road map and key...
Steve King
Managing Director, Cybersecurity Marketing Advisory Services
CyberTheory
Steve King has served in senior leadership roles in technology development and deployment for the past 25 years. He is an author, lecturer and serial startup founder, including three successful exits in cybersecurity, and served for six years as the...
Lisa McKee
Sr. Manager, Security and Privacy
Protiviti
Dr. Lisa McKee has 20 years of industry experience in cybersecurity, privacy, information technology, vendor management, software development, IT audit, compliance, PCI and GRC. She assists companies conducting security and privacy assessments, implementing programs and managing compliance. McKee is a...
Anna Delaney
Director, ISMG Productions
ISMG
Vivin Sathyan
Senior Technology Evangelist
ManageEngine
Sathyan is a senior technical evangelist for the ADSolutions team at ManageEngine. He presents POCs, and handles implementation and product training for ADSolutions customers across the globe.
Gray Mitchell
VP of Information Security
Global Atlantic Financial Group
For over two decades, Gray Mitchell has pioneered innovative security solutions to solve complex business challenges in his role as a CISO in heavily regulated industries, including Fortune 100 healthcare companies, financial institutions, state government agencies and educational organizations. Mitchell...
Brigadier General (ret) Greg Touhill
Director of the CERT Division
Carnegie Mellon University’s Software Engineering Institute
Gregory J. Touhill is director of the world-renowned CERT Division of the Carnegie Mellon University Software Engineering Institute, where he leads a diverse group of researchers, software engineers, security analysts and digital intelligence specialists working together to research security vulnerabilities...
Rob LaMagna-Reiter
CISO
Hudl
Robert LaMagna-Reiter is a leading, trusted information security and risk management professional. As CISO for Hudl, he leads information security strategies and road maps and oversees risk management, strategy, architecture and engineering, regulatory compliance and IT governance. Leveraging more than...
George Finney
CISO
Southern Methodist University
George Finney is a chief information security officer who believes that people are the key to solving our cybersecurity challenges. He is the bestselling author of several cybersecurity books, including the award-winning "Well Aware: Master the Nine Cybersecurity Habits to...
John Remo
Senior Vice President, Global Cloud / Infrastructure & Cybersecurity
Warner Music Group
John Remo is senior vice president, global infrastructure and cybersecurity, at Warner Music Group and a strong proponent of Zero Trust principles. He has led his team through moving all applications to the cloud, consolidating legacy applications and implementing single...
Chris McCormack
Product Marketing Manager
Sophos
Chris McCormack is a network security specialist at Sophos where he has been focused on firewall and network protection since 2008. Chris specializes in providing advice and insight into the latest threats and network protection technologies and strategies.
Jon Drake
CIO & EVP
Inwood Bank
Jon Drake is executive vice president and chief information officer at Inwood National Bank, a leading commercial and community bank with total assets in excess of $4 billion in the Dallas/Fort Worth area. He has over 30 years of experience...
Matt Howard
SVP & Chief Marketing Officer
Virtru
A proven executive and entrepreneur with over 25 years experience developing high-growth software companies, Matt serves as Virtu’s CMO and leads all aspects of the company’s go-to-market motion within the data protection and Zero Trust security ecosystems. Prior to Virtru,...
EP Mathew
Deputy Chief Information Officer
Defense Intelligence Agency
Edacheril "E.P." Mathew became the deputy CIO of the Defense Intelligence Agency in July 2021, after previously serving as the chief of operations for CIO. He was promoted to the Senior National Intelligence Service in 2019. As chief of operations,...
View Agenda
Zero Trust and the Dangers of the Implicit Trust
Ian Farquhar, Field CTO, Gigamon

The tenets of zero trust are well defined in NIST SP 800-207, but have many architects truly taken them on-board? Are we exhibiting a familiarity bias: over-trusting certain mechanisms and failing to properly ascertain their trustability, as we are required to?  Are we ignoring others, which provide useful evidence of trustability?  Are we looking too much at the actual network we are trying to protect, and disregarding unmanaged devices, IoT/OT/ICS, BYOD?  Is EDR, as is mandated by EO M-22-01, the right approach, or an initial step on the road?  How do we expect our adversaries to behave, and how do we counter that threat in the way we architect our zero trust environments?

Ian Farquhar
  • 09:00 AM
  • 09:29 AM
Zero Trust: The Strategic Approach
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity

Zero Trust: At its core, it is a strategy designed to stop data breaches and other cyberattacks. Done right, it provides demonstrable, positive security outcomes for companies who adopt it. Done wrong? Whole different story.

In this exclusive keynote, John Kindervag, the creator of Zero Trust and chair of this summit, discusses:

  • The 2022 state of Zero Trust; 
  • Four strategic elements of engagement; 
  • The road map for the Zero Trust journey.

John Kindervag
  • 09:30 AM
  • 09:59 AM
  • 10:00 AM
  • 10:29 AM
Track A
Dr. Chase Cunnigham
Track A: This Is How You Fail
Dr. Chase Cunnigham, Chief Strategy Officer (CSO), Ericom Software

Much of the past year's dialogue - and much of the remainder of this summit - has been devoted to how to succeed at adopting Zero Trust architecture. But in this unique session, Chase Cunningham - the "Doctor of Zero Trust" - focuses intently on reasons why well-meaning enterprises fail. Among the topics addressed here: 

  • Approaching Zero Trust the wrong way, for the wrong reasons; 
  • Technical and cultural hindrances that can't be overcome; 
  • Failure to account for the human factor.
  • 10:00 AM
  • 10:31 AM
Track B
Rob LaMagna-Reiter
Lisa McKee
Track B: Zero Trust and Privacy
Rob LaMagna-Reiter, CISO, Hudl
Lisa McKee, Sr. Manager, Security and Privacy, Protiviti

At the center of Zero Trust is data - and for good reason. Organizations that have visibility into their data and the activity around it can detect suspicious behavior, even when other security controls have been compromised. In this session, Hudl CISO Robert LaMagna-Reiter and Dr. Lisa McKee, Sr. Manager Security and Privacy at Protiviti will outline:

  • Zero Trust privacy and security responsibilities;
  • Methods for coordination and collaboration between privacy and security within a ZT strategy;
  • Overcoming challenges and integrating Zero Trust in the worlds of privacy and security.
Hybrid IAM with a Zero Trust Approach
Vivin Sathyan, Senior Technology Evangelist, ManageEngine

Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program - the main reason why organizations often opt for a hybrid AD approach. However, the other side of the coin w.r.t hybrid AD approach is, your network perimeters disappear. To address this new challenge, organizations must build a unified security strategy with hybrid identity management at the center.

Vivin Sathyan
  • 10:30 AM
  • 11:02 AM
The Top Six Advantages of ZTNA
Chris McCormack, Product Marketing Manager, Sophos

Join this session to learn why many organizations are switching from traditional remote access VPN to Zero Trust Network Access (ZTNA). Discussion topics include:

  • The risks and challenges associated with remote access VPN
  • How ZTNA works differently
  • The top use cases and advantages of ZTNA
  • What to look for when buying a ZTNA solution 
Chris McCormack
  • 11:00 AM
  • 11:29 AM
Zero Trust Data Access: Are You Protecting What Matters Most?
Will Ackerly, CTO & Co-Founder, Virtru
Matt Howard, SVP & Chief Marketing Officer, Virtru

The digital world is now perimeter-less and the practice of cybersecurity is rapidly shifting from centralized, to decentralized policy controls.  Thus far, zero trust security initiatives have focused primarily on enforcing policies pertaining to identities, devices, networks, and apps.  But what about the data itself?  Simply stated, data is everyone's most valuable resource and it's constantly on the move; being downloaded, shared, copied, and modified here, there, and everywhere. You can’t afford to lock it down, and you can't afford to lose control of it.  

Join Virtru’s CTO & Co-Founder, Will Ackerly, and SVP & CMO, Matt Howard, as they discuss the importance of Zero Trust Data Access (ZTDA) and the benefits of adding policy controls that are capable of following sensitive data regardless of where it goes or how it is used.

Will Ackerly
Matt Howard
  • 11:30 AM
  • 11:59 AM
Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 12:00 PM
  • 12:14 PM
Why You Need to Focus on Digital Trust to Enable Zero Trust
David Mahdi, CISO / CSO Executive Management, Sectigo

Zero Trust, identity-first, and perimeter-less security practices all require digital identities to establish digital trust.  In 2021, signaling the criticality, identity-first security and machine identity management debuted in the Gartner Top Security and Risk Trends.  Join Sectigo's CSO and former Gartner analyst, David Mahdi, to learn about the importance of identity-first security and establishing digital trust for human and machine identities in Zero Trust.

David Mahdi
  • 12:15 PM
  • 12:47 PM
  • 12:45 PM
  • 01:31 PM
Track A
George Finney
Track A: Why Zero Trust Is the ONLY Strategy for Securing Higher Ed
George Finney, CISO, Southern Methodist University

Higher education is one of the most challenging environments to secure. Universities are like a combination of a small city, an ISP, a medium-sized enterprise and a research organization. From huge attack surfaces, funding issues, decentralized IT, legacy technology, to curious students, higher education offers a host of challenges to overcome in regard to protecting the community. But higher education can serve as a blueprint for how any organization can implement Zero Trust to prevent breaches from occurring. George Finney will share his lessons learned from over a decade of Zero Trust transformation at SMU.

After attending this session, participants will:

  • Understand how to use the Zero Trust methodology to protect critical assets; 
  • Identify existing tools and resources that can accelerate their Zero Trust journey.
  • 12:45 PM
  • 01:14 PM
Track B
Jon Drake
John Kindervag
Track B: Zero Trust Case Study: Inwood Bank
Jon Drake, CIO & EVP, Inwood Bank
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity

Many enterprises are thinking about Zero Trust. Some have developed road maps. Inwood Bank is in the midst of its Zero Trust journey now, and CIO Jon Drake is here to share lessons learned from the experience. He and John Kindervag - the creator of Zero Trust - share insight on:

  • Business drivers for Zero Trust;
  • How to sell Zero Trust to non-tech executives;
  • How Zero Trust creates a new competitive advantage.
  • 01:15 PM
  • 01:46 PM
Track A
John Kindervag
Grant Schneider
EP Mathew
Track A: Can Zero Trust and Risk Management Programs Coexist?
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity
Grant Schneider, Senior Director for Cybersecurity Services, Venable LLP
EP Mathew, Deputy Chief Information Officer, Defense Intelligence Agency

Most organizations have taken a risk management approach to cybersecurity, and many have adopted the NIST Risk Management Framework as a methodology for their cybersecurity programs. With the new focus on Zero Trust, this panel will explore the interactions between a Zero Trust implementation and a risk management program. Does Zero Trust replace or obviate the need for a risk management program? Is Zero Trust a part of an organization's risk management program, or are the two independent?

  • 01:15 PM
  • 01:47 PM
Track B
Richard Bird
Gray Mitchell
Track B: All Other Identities: What Do They Mean for Zero Trust?
Richard Bird, Chief Product Officer, SecZetta
Gray Mitchell, VP of Information Security, Global Atlantic Financial Group

The world of identity and access management has spent over 30 years focusing almost exclusively on the enterprise workforce. Only in the last few years has the industry added structured customer access management as a solution. And yet, all identity solutions companies loudly pronounce, "Does identity have a role to play in Zero Trust? What about all of the other identities?"

Doesn’t a workforce-only IAM approach suggest a world of "us and them"? The "them" includes an entire universe of entities and identities that are critically important to your business success, such as partners, full-time contractors, students, volunteers, suppliers and technicians. Listen in as our expert panel discusses what all of these other identities mean in relation to security, operational challenges and achieving Zero Trust.

Zero Trust Myth Busting
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity
Steve King, Managing Director, Cybersecurity Marketing Advisory Services, CyberTheory
John Remo, Senior Vice President, Global Cloud / Infrastructure & Cybersecurity, Warner Music Group
Brigadier General (ret) Greg Touhill, Director of the CERT Division, Carnegie Mellon University’s Software Engineering Institute

Following the 2021 RSAC conference keynote by Cisco CEO Chuck Robbins on the importance of Zero Trust, the concept has received unprecedented attention.
After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the Zero Trust Promised Land.
There has been more marketing around ZT than for any prior cybersecurity product, technology or service.
The outcome? Confusion, cynicism and outright rejection of ZT principles, based on misinformation and overly hyped vendor solutions that had nothing to do with Zero Trust.
It’s a product, a service, a reference architecture, a strategy, a concept, a direction and a lifestyle. But, in reality, it is none of those things.
Zero Trust is a set of guiding principles for re-architecting networks and computing environments that reduces the overall attack surface, removes excessive trust, improves identity authentication and monitors activity and behavior to discover anomalies before systems are breached.
Zero Trust leverages existing cybersecurity products, such as microsegmentation, identity access and application security, and it can be implemented in small chunks to incrementally improve an organizations’ security posture.
This session dissects some of the Zero Trust myths.

John Kindervag
Steve King
John Remo
Brigadier General (ret) Greg Touhill
  • 01:45 PM
  • 02:29 PM
Zero Trust and Privacy: Meet the Experts Live and Interactive Q&A
Steve King, Managing Director, Cybersecurity Marketing Advisory Services, CyberTheory
Rob LaMagna-Reiter, CISO, Hudl
Lisa McKee, Sr. Manager, Security and Privacy, Protiviti
Steve King
Rob LaMagna-Reiter
Lisa McKee
  • 02:30 PM
  • 02:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, February 23rd. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Zero trust: It is the security model of choice for enterprises looking to up their game and change the relationship dynamic between attackers and defenders … and it's also a top marketing buzzword. In the 2022 Zero Trust Summit, thought leaders seek to cut past the hype and get straight to the latest insight, use cases and best practices on how the zero trust model is being deployed as a pre-condition to operating a safe and secure IT environment, regardless of enterprise size and sector.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Grant Schneider
Senior Director for Cybersecurity Services
Venable LLP
Prior to Venable, Schneider served as the U.S. deputy federal CISO and the U.S. federal CISO and as senior director for cybersecurity policy on the White House National Security Council. Before that, he served for seven years as chief information...
Richard Bird
Chief Product Officer
SecZetta
Richard Bird is an internationally recognized identity-centric security expert who has been a CIO and CISO and the global head of identity management for JPMorgan Chase. Now, he is chief customer information officer for Ping Identity. Bird religiously believes that...
Tom FIeld
SVP, Editorial
ISMG
Ian Farquhar
Field CTO
Gigamon
Ian has worked in IT security for 30 years. At Gigamon he is Field CTO (Global), and also leads the Security Architecture Team. The SAT assists customers worldwide in high complexity security designs and operational capabilities, including incident response and...
Will Ackerly
CTO & Co-Founder
Virtru
Will is the CTO and Co-Founder of Virtru. Prior to founding Virtru, Will spent eight years at the National Security Agency (NSA) where he specialized in cloud analytics and security architecture—specifically protecting the agency’s in-house data transfers. During his tenure...
David Mahdi
CISO / CSO Executive Management
Sectigo
David Mahdi is Chief Strategy Officer and CISO Advisor at Sectigo. In his role, David leads the company’s overall strategy, direction, and M&A efforts to expand its leadership in the digital trust space. With 20+ years of experience in IT...
Dr. Chase Cunnigham
Chief Strategy Officer (CSO)
Ericom Software
Dr. Chase Cunningham, aka the Doctor of Zero Trust, is a recipient of Security magazine’s Most Influential People in Security and is currently Ericom’s chief strategy officer. In this role, he shapes the company’s strategic vision, road map and key...
Steve King
Managing Director, Cybersecurity Marketing Advisory Services
CyberTheory
Steve King has served in senior leadership roles in technology development and deployment for the past 25 years. He is an author, lecturer and serial startup founder, including three successful exits in cybersecurity, and served for six years as the...
Lisa McKee
Sr. Manager, Security and Privacy
Protiviti
Dr. Lisa McKee has 20 years of industry experience in cybersecurity, privacy, information technology, vendor management, software development, IT audit, compliance, PCI and GRC. She assists companies conducting security and privacy assessments, implementing programs and managing compliance. McKee is a...
Anna Delaney
Director, ISMG Productions
ISMG
Vivin Sathyan
Senior Technology Evangelist
ManageEngine
Sathyan is a senior technical evangelist for the ADSolutions team at ManageEngine. He presents POCs, and handles implementation and product training for ADSolutions customers across the globe.
Gray Mitchell
VP of Information Security
Global Atlantic Financial Group
For over two decades, Gray Mitchell has pioneered innovative security solutions to solve complex business challenges in his role as a CISO in heavily regulated industries, including Fortune 100 healthcare companies, financial institutions, state government agencies and educational organizations. Mitchell...
Brigadier General (ret) Greg Touhill
Director of the CERT Division
Carnegie Mellon University’s Software Engineering Institute
Gregory J. Touhill is director of the world-renowned CERT Division of the Carnegie Mellon University Software Engineering Institute, where he leads a diverse group of researchers, software engineers, security analysts and digital intelligence specialists working together to research security vulnerabilities...
Rob LaMagna-Reiter
CISO
Hudl
Robert LaMagna-Reiter is a leading, trusted information security and risk management professional. As CISO for Hudl, he leads information security strategies and road maps and oversees risk management, strategy, architecture and engineering, regulatory compliance and IT governance. Leveraging more than...
George Finney
CISO
Southern Methodist University
George Finney is a chief information security officer who believes that people are the key to solving our cybersecurity challenges. He is the bestselling author of several cybersecurity books, including the award-winning "Well Aware: Master the Nine Cybersecurity Habits to...
John Remo
Senior Vice President, Global Cloud / Infrastructure & Cybersecurity
Warner Music Group
John Remo is senior vice president, global infrastructure and cybersecurity, at Warner Music Group and a strong proponent of Zero Trust principles. He has led his team through moving all applications to the cloud, consolidating legacy applications and implementing single...
Chris McCormack
Product Marketing Manager
Sophos
Chris McCormack is a network security specialist at Sophos where he has been focused on firewall and network protection since 2008. Chris specializes in providing advice and insight into the latest threats and network protection technologies and strategies.
Jon Drake
CIO & EVP
Inwood Bank
Jon Drake is executive vice president and chief information officer at Inwood National Bank, a leading commercial and community bank with total assets in excess of $4 billion in the Dallas/Fort Worth area. He has over 30 years of experience...
Matt Howard
SVP & Chief Marketing Officer
Virtru
A proven executive and entrepreneur with over 25 years experience developing high-growth software companies, Matt serves as Virtu’s CMO and leads all aspects of the company’s go-to-market motion within the data protection and Zero Trust security ecosystems. Prior to Virtru,...
EP Mathew
Deputy Chief Information Officer
Defense Intelligence Agency
Edacheril "E.P." Mathew became the deputy CIO of the Defense Intelligence Agency in July 2021, after previously serving as the chief of operations for CIO. He was promoted to the Senior National Intelligence Service in 2019. As chief of operations,...

View Agenda
Zero Trust and the Dangers of the Implicit Trust
Ian Farquhar, Field CTO, Gigamon

The tenets of zero trust are well defined in NIST SP 800-207, but have many architects truly taken them on-board? Are we exhibiting a familiarity bias: over-trusting certain mechanisms and failing to properly ascertain their trustability, as we are required to?  Are we ignoring others, which provide useful evidence of trustability?  Are we looking too much at the actual network we are trying to protect, and disregarding unmanaged devices, IoT/OT/ICS, BYOD?  Is EDR, as is mandated by EO M-22-01, the right approach, or an initial step on the road?  How do we expect our adversaries to behave, and how do we counter that threat in the way we architect our zero trust environments?

Ian Farquhar
  • 09:00 AM
  • 09:29 AM
Zero Trust: The Strategic Approach
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity

Zero Trust: At its core, it is a strategy designed to stop data breaches and other cyberattacks. Done right, it provides demonstrable, positive security outcomes for companies who adopt it. Done wrong? Whole different story.

In this exclusive keynote, John Kindervag, the creator of Zero Trust and chair of this summit, discusses:

  • The 2022 state of Zero Trust; 
  • Four strategic elements of engagement; 
  • The road map for the Zero Trust journey.

John Kindervag
  • 09:30 AM
  • 09:59 AM
  • 10:00 AM
  • 10:29 AM
Track A
Dr. Chase Cunnigham
Track A: This Is How You Fail
Dr. Chase Cunnigham, Chief Strategy Officer (CSO), Ericom Software

Much of the past year's dialogue - and much of the remainder of this summit - has been devoted to how to succeed at adopting Zero Trust architecture. But in this unique session, Chase Cunningham - the "Doctor of Zero Trust" - focuses intently on reasons why well-meaning enterprises fail. Among the topics addressed here: 

  • Approaching Zero Trust the wrong way, for the wrong reasons; 
  • Technical and cultural hindrances that can't be overcome; 
  • Failure to account for the human factor.
  • 10:00 AM
  • 10:31 AM
Track B
Rob LaMagna-Reiter
Lisa McKee
Track B: Zero Trust and Privacy
Rob LaMagna-Reiter, CISO, Hudl
Lisa McKee, Sr. Manager, Security and Privacy, Protiviti

At the center of Zero Trust is data - and for good reason. Organizations that have visibility into their data and the activity around it can detect suspicious behavior, even when other security controls have been compromised. In this session, Hudl CISO Robert LaMagna-Reiter and Dr. Lisa McKee, Sr. Manager Security and Privacy at Protiviti will outline:

  • Zero Trust privacy and security responsibilities;
  • Methods for coordination and collaboration between privacy and security within a ZT strategy;
  • Overcoming challenges and integrating Zero Trust in the worlds of privacy and security.
Hybrid IAM with a Zero Trust Approach
Vivin Sathyan, Senior Technology Evangelist, ManageEngine

Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program - the main reason why organizations often opt for a hybrid AD approach. However, the other side of the coin w.r.t hybrid AD approach is, your network perimeters disappear. To address this new challenge, organizations must build a unified security strategy with hybrid identity management at the center.

Vivin Sathyan
  • 10:30 AM
  • 11:02 AM
The Top Six Advantages of ZTNA
Chris McCormack, Product Marketing Manager, Sophos

Join this session to learn why many organizations are switching from traditional remote access VPN to Zero Trust Network Access (ZTNA). Discussion topics include:

  • The risks and challenges associated with remote access VPN
  • How ZTNA works differently
  • The top use cases and advantages of ZTNA
  • What to look for when buying a ZTNA solution 
Chris McCormack
  • 11:00 AM
  • 11:29 AM
Zero Trust Data Access: Are You Protecting What Matters Most?
Will Ackerly, CTO & Co-Founder, Virtru
Matt Howard, SVP & Chief Marketing Officer, Virtru

The digital world is now perimeter-less and the practice of cybersecurity is rapidly shifting from centralized, to decentralized policy controls.  Thus far, zero trust security initiatives have focused primarily on enforcing policies pertaining to identities, devices, networks, and apps.  But what about the data itself?  Simply stated, data is everyone's most valuable resource and it's constantly on the move; being downloaded, shared, copied, and modified here, there, and everywhere. You can’t afford to lock it down, and you can't afford to lose control of it.  

Join Virtru’s CTO & Co-Founder, Will Ackerly, and SVP & CMO, Matt Howard, as they discuss the importance of Zero Trust Data Access (ZTDA) and the benefits of adding policy controls that are capable of following sensitive data regardless of where it goes or how it is used.

Will Ackerly
Matt Howard
  • 11:30 AM
  • 11:59 AM
Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 12:00 PM
  • 12:14 PM
Why You Need to Focus on Digital Trust to Enable Zero Trust
David Mahdi, CISO / CSO Executive Management, Sectigo

Zero Trust, identity-first, and perimeter-less security practices all require digital identities to establish digital trust.  In 2021, signaling the criticality, identity-first security and machine identity management debuted in the Gartner Top Security and Risk Trends.  Join Sectigo's CSO and former Gartner analyst, David Mahdi, to learn about the importance of identity-first security and establishing digital trust for human and machine identities in Zero Trust.

David Mahdi
  • 12:15 PM
  • 12:47 PM
  • 12:45 PM
  • 01:31 PM
Track A
George Finney
Track A: Why Zero Trust Is the ONLY Strategy for Securing Higher Ed
George Finney, CISO, Southern Methodist University

Higher education is one of the most challenging environments to secure. Universities are like a combination of a small city, an ISP, a medium-sized enterprise and a research organization. From huge attack surfaces, funding issues, decentralized IT, legacy technology, to curious students, higher education offers a host of challenges to overcome in regard to protecting the community. But higher education can serve as a blueprint for how any organization can implement Zero Trust to prevent breaches from occurring. George Finney will share his lessons learned from over a decade of Zero Trust transformation at SMU.

After attending this session, participants will:

  • Understand how to use the Zero Trust methodology to protect critical assets; 
  • Identify existing tools and resources that can accelerate their Zero Trust journey.
  • 12:45 PM
  • 01:14 PM
Track B
Jon Drake
John Kindervag
Track B: Zero Trust Case Study: Inwood Bank
Jon Drake, CIO & EVP, Inwood Bank
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity

Many enterprises are thinking about Zero Trust. Some have developed road maps. Inwood Bank is in the midst of its Zero Trust journey now, and CIO Jon Drake is here to share lessons learned from the experience. He and John Kindervag - the creator of Zero Trust - share insight on:

  • Business drivers for Zero Trust;
  • How to sell Zero Trust to non-tech executives;
  • How Zero Trust creates a new competitive advantage.
  • 01:15 PM
  • 01:46 PM
Track A
John Kindervag
Grant Schneider
EP Mathew
Track A: Can Zero Trust and Risk Management Programs Coexist?
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity
Grant Schneider, Senior Director for Cybersecurity Services, Venable LLP
EP Mathew, Deputy Chief Information Officer, Defense Intelligence Agency

Most organizations have taken a risk management approach to cybersecurity, and many have adopted the NIST Risk Management Framework as a methodology for their cybersecurity programs. With the new focus on Zero Trust, this panel will explore the interactions between a Zero Trust implementation and a risk management program. Does Zero Trust replace or obviate the need for a risk management program? Is Zero Trust a part of an organization's risk management program, or are the two independent?

  • 01:15 PM
  • 01:47 PM
Track B
Richard Bird
Gray Mitchell
Track B: All Other Identities: What Do They Mean for Zero Trust?
Richard Bird, Chief Product Officer, SecZetta
Gray Mitchell, VP of Information Security, Global Atlantic Financial Group

The world of identity and access management has spent over 30 years focusing almost exclusively on the enterprise workforce. Only in the last few years has the industry added structured customer access management as a solution. And yet, all identity solutions companies loudly pronounce, "Does identity have a role to play in Zero Trust? What about all of the other identities?"

Doesn’t a workforce-only IAM approach suggest a world of "us and them"? The "them" includes an entire universe of entities and identities that are critically important to your business success, such as partners, full-time contractors, students, volunteers, suppliers and technicians. Listen in as our expert panel discusses what all of these other identities mean in relation to security, operational challenges and achieving Zero Trust.

Zero Trust Myth Busting
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity
Steve King, Managing Director, Cybersecurity Marketing Advisory Services, CyberTheory
John Remo, Senior Vice President, Global Cloud / Infrastructure & Cybersecurity, Warner Music Group
Brigadier General (ret) Greg Touhill, Director of the CERT Division, Carnegie Mellon University’s Software Engineering Institute

Following the 2021 RSAC conference keynote by Cisco CEO Chuck Robbins on the importance of Zero Trust, the concept has received unprecedented attention.
After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the Zero Trust Promised Land.
There has been more marketing around ZT than for any prior cybersecurity product, technology or service.
The outcome? Confusion, cynicism and outright rejection of ZT principles, based on misinformation and overly hyped vendor solutions that had nothing to do with Zero Trust.
It’s a product, a service, a reference architecture, a strategy, a concept, a direction and a lifestyle. But, in reality, it is none of those things.
Zero Trust is a set of guiding principles for re-architecting networks and computing environments that reduces the overall attack surface, removes excessive trust, improves identity authentication and monitors activity and behavior to discover anomalies before systems are breached.
Zero Trust leverages existing cybersecurity products, such as microsegmentation, identity access and application security, and it can be implemented in small chunks to incrementally improve an organizations’ security posture.
This session dissects some of the Zero Trust myths.

John Kindervag
Steve King
John Remo
Brigadier General (ret) Greg Touhill
  • 01:45 PM
  • 02:29 PM
Zero Trust and Privacy: Meet the Experts Live and Interactive Q&A
Steve King, Managing Director, Cybersecurity Marketing Advisory Services, CyberTheory
Rob LaMagna-Reiter, CISO, Hudl
Lisa McKee, Sr. Manager, Security and Privacy, Protiviti
Steve King
Rob LaMagna-Reiter
Lisa McKee
  • 02:30 PM
  • 02:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, February 23rd. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

February 22 - 23, 2022

Zero Trust Summit