Webinar

A Surprise Trip to Zero-Trust Land


Tuesday, June 4, 2020

11:00 AM - 12:00 PM PDT

60 minutes, including Q&A


Some organizations have been embracing the "zero trust" security model, and others are still trying to decide what it means and whether it makes sense for them to try it. With the sudden need for more flexibility, scalability and remote access, many of these enterprises have found themselves in unfamiliar territory without a map.

In this session, we'll talk about how adopting this security "design pattern" can actually help address current needs, and why it makes sense to build in zero trust to deal with future challenges beyond attacks.

Brought to you by:

Ping Identity

Guest Presenter:

Wendy Nather

Head of the Advisory Team

Cisco

Wendy Nather is head of the Advisory CISO team at Duo Security (now Cisco). She was previously the Research Director at the Retail ISAC, as well as Research Director of the Information Security Practice at independent analyst firm 451 Research. Wendy led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency.

She is co-author ofThe Cloud Security Rules, and was listed as one of SC Magazine's Women in IT Security "Power Players" in 2014, as well as an "Influencer" in the Reboot Leadership Awards in 2018. She serves on the advisory board for Sightline Security, an organization that helps nonprofits improve their cybersecurity.


Sponsor Presenter:

Baber Amin

CTO

Ping Identity

Mr. Amin is a senior technology executive experienced in building and scaling businesses at software, networking, public and private companies. He has a broad background in enterprise security, identity and access management, identity proofing, authentication, privacy, and API security. He is a strong strategic thinker with operational execution, portfolio and P&L management skills.

At Ping Identity, Mr. Amin is currently CTO for West, helping customers with their IAM best practices, strategy execution, zero trust architecture, IoT Identity, and modeling for a privacy first approach. At Ping Identity he is also guiding product roadmap for Zero Trust, AI/ML strategy, championing privacy by design principals, and evaluating M&A.

Sustaining Partners