Welcome to Zero Trust Thirty, a podcast that offers unique and valuable perspectives about the latest issues, trends, technologies and solutions that are shaping the world of Zero Trust and people-defined security. Listen in to key thought leaders and not
According to PwC, “only 33% of directors say they think their board understands the company's cybersecurity vulnerabilities very well.” This comes as no surprise given 63% of CISOs don't report to the board at all, according to a Ponemon Institute report. This general lack of top-down cybersecurity knowledge, or even desire to understand, makes a CISO's job extraordinarily difficult. So, vulnerabilities amass and organizations are left flat footed when those vulnerabilities get exploited. Now is the time to bridge the gap between CISOs and the board by elevating the security and operational benefits of Zero Trust principles across the greater organization to build a culture of readiness and resilience.Guests:Jawahar Sivasankaran, President and COO, Appgate; Leo Taddeo, CISO, Appgate President, Appgate FederalModerator:George Wilkes, VP of Demand Generation, Appgate
A new Ponemon Institute study reveals that, as cloud adoption grows across diverse environments, 60% of IT and security leaders aren't confident that their organization can ensure secure access to cloud environments. Dr. Larry Ponemon, the institute's founder and chairman, illuminates key findings from the Global Study on Zero Trust Security for the Cloud including factors that make cloud security complex and how Zero Trust security can mitigate distributed infrastructure risks and accelerate cloud transformation objectives.Get a copy of the Global Study on Zero Trust Security for the Cloud here.Guest:Larry Ponemon, Chairman and Founder of the Ponemon InstituteModerator:George Wilkes, VP of Demand Generation, Appgate
Many have embraced Zero Trust security principles, but haven't fully mapped out their journeys or don't know where to start. Whether you're a Zero Trust zealot, skeptic or somewhere in between, you should know the four stages of the Zero Trust Maturity Model. Recorded from the floor of RSA® Conference 2022, we dig into each stage and how organizations can bake Zero Trust security into their IT and business ecosystems.Get the Zero Trust Maturity Model Roadmap guide referred to in the episode by clicking here.Guests:Jason Garbis, Chief Product Officer, Appgate; Jim Anthony, Senior Vice President, Cybersecurity, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateFor more information on Zero Trust security, visit ww.appgate.com.
We investigate how Zero Trust Network Access reduces security complexity, improves user experience and delivers a unified policy engine to control user-to-resource and resource-to-resource connections from inside and outside the fading, traditional corporate perimeter.Guests:Garrett Bekker, Principal Research Analyst, 451 Research, a part of S&P Global Market Intelligence; Chris Scheels, Vice President of Product Marketing, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateFor more information on Zero Trust Network access, visit www.appgate.com.
Everyone claims Zero Trust, but we call BS. The Zero Trust security conversation is filled with imitators, pretenders, acronyms and jargon—making it more confusing than the tech itself. Recorded at RSA® Conference 2022, Dr. Chase Cunningham, aka Dr. Zero Trust, and Jason Garbis, co-author of Zero Trust Security: An Enterprise Guide, team up to break through all the BS and dig into what's truly real Zero Trust security.Guests:Dr. Chase Cunningham, aka Dr. Zero Trust; Jason Garbis, Chief Product Officer, Appgate Moderator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
It's been almost a year since the White House issued its Executive Order on Improving the Nation's Cybersecurity that mandates agencies and departments execute a Zero Trust security strategy. As the Cybersecurity & Infrastructure Security Agency, National Security Agency, Department of Defense and others lead this federal march to Zero Trust, the question becomes, is the timeline fast enough? And as cyber warfare escalates, how can private and public sectors work together to strengthen critical infrastructure and universal cybersecurity defenses with Zero Trust?Guests:Steve Haselhorst, Zero Trust Program Manager, OCISO Organization, FDIC; Michael Friedrich, VP, Federal Technical Strategy and Innovation, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
Zero Trust isn't a pre-packaged solution you buy off the shelf, and each organization's approach and existing system is different. The principles of Zero Trust harden security postures, remove complexity and unlock vast operational benefits. But it takes a village of solution integrations to get there. From identity, SIEM, endpoint, threat intelligence and ITSM to everything in between, what integrations are beneficial and how do API-rich solutions get you to a full Zero Trust access ecosystem faster?Guests:Tony Zirnoon, Sr. Director, Technology Alliances, Appgate; Wayne Geils, Director, Technical Integrations, Appgate Moderator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
Many organizations have abandoned insecure VPNs for Zero Trust Network Access to secure their fully remote workforces. But the fundamental “never trust, always verify” Zero Trust principle applies to more than remote users. As offices and corporate campuses re-open, ZTNA is not just for remote access and should extend secure access to local area networks (LANs) and wide area networks (WANs) for all users, devices and workloads, regardless of location. We discuss how security teams and network teams can work together to provide a unified policy engine and enhanced visibility to an entire company's ecosystem.Guests:Chris Scheels, VP, Product Marketing, Appgate; Greg Shields, Director, Product ManagementModerator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
More enterprises are moving to a cloud-native and containerized world to drive productivity, agility and scale for software development. And the biggest DevOps breakthrough is the CI/CD pipeline. It's now time for a similar revolution in enterprise network security automation between services. So how does Zero Trust for the cloud secure access to, from and within containerized workloads without hindering the DevOps race to win?Guests:Kurt Glazemakers, Chief Technology Officer, Appgate; Aaron Palermo, Senior Solutions Architect, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
According to CISA, there are 16 critical infrastructure sectors, including emergency services, healthcare, financial institutions, IT, water, transportation, manufacturing and government facilities. Globally, cyberthreats against critical infrastructure are at an all-time high and breaches can lead to debilitating security, health and economic crises. So how can federal agencies and supporting public sector organizations use Zero Trust to ensure stronger security continuity, consistency and efficiency to guard against cyberattacks on vital ecosystems comprising IT, IoT and OT technologies? Guest:Jim Anthony, SVP, Sales Engineering, Appgate; Michael Friedrich, VP, Federal Technical Strategy and InnovationModerator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
The rise of ransomware and critical infrastructure attacks, calls to action from federal agencies like CISA and the DoD and amped business risks due to scattered workloads and workforces are driving many organizations to Zero Trust security. Special guest David Holmes, senior analyst at Forrester Research, delivers authoritative insights on the Zero Trust market and reveals why these tailwinds are driving rapid adoption. Guest:David Holmes, Senior Analyst, ForresterModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
Cybercrime is a lucrative business with high rewards and low risk perpetrated by skilled threat actors. Many factors complicate protecting data and assets, including ever-growing attack vectors, flat network topologies, outdated perimeter-based solutions, overprivileged users, hybrid infrastructure and connect, then verify architectures. How does Zero Trust close the gaps to defend against escalating cyberthreats? Guests:Chris Scheels, VP, Product Marketing, Appgate; Greg Shields, Director, Product Management, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
Why is knowledge sharing between Baby Boomers, Gen-Xers and Millennials critical to close the cybersecurity skills gap and retain technical knowledge as legacy systems move to the cloud and Zero Trust security is accelerated? Author, speaker and intergenerational diversity expert Henry Rose Lee and cybersecurity market pro Julie Preiss team up to break down key findings from the first-of-its-kind study, "How Do Generational Differences Impact Enterprise Cybersecurity Teams?"Guests:Henry Rose Lee, Inter-Generational Diversity & Inclusion Expert; Julie Preiss, Chief Marketing Officer, Appgate Moderator:George Wilkes, VP of Demand Generation, AppgateDownload a copy of the full How Do Generational Differences Impact Enterprise Cybersecurity Teams? here.Visit www.appgate.com for more Zero Trust security resources.
Insider threats remain one of the leading causes of data breaches and, whether accidental or malicious, can result in lost critical data or threat actor extortion. But what exactly are insider threats and how can organizations address these types of unique, often elusive, risks? Joseph Blankenship, VP, Research Director for Forrester Research, brings valuable, in-depth insider threat insights to the Zero Trust Thirty table.Guest:Joseph Blankenship, VP, Research Director, Forrester ResearchModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
Today we explore prevailing threat landscape and Zero Trust security trends in Latin America. What are the greatest cyberthreats? How quickly have organizations adopted Zero Trust principles? What stands in the way of greater adoption? What can the rest of the world learn from LATAM's experience with Zero Trust? Guests:Felipe Duarte Domingues, Security Researcher, Appgate; Florencia Martin, Regional Sales Director Argentina, Chile and Uruguay, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
Digital transformation, industry 4.0, the fourth industrial revolution, data is the new oil …whatever you want to call it or however you want to explain it, there have been fundamental changes in how businesses leverage technology ... and with it, in partiicular, serious implications for how to secure the supply chain, intellectual property and IOT/OT related to the manufacturing industry.Guests:Patrick Doliny, SVP of Information Technology & Cyber Security, Bang Energy; Jawahar Sivasankaran, President & COO, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
As we head into 2022, let's take a deep dive into the state of the channel and how channel partners perceive Zero Trust. In a conversation that takes us from North America to LATAM and EMEA and APJ, we explore the value and importance of channel partners in spreading adoption of Zero Trust.Guests:Fiona Doak, Director of Channel Sales EMEA, Appgate; Tina Gravel, SVP of Global Channels and Alliances, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
Over the last two years, enterprises lived through the world's largest unplanned experiment in remote access. As we head into 2022, what did we learn and what can we expect in the year ahead? In this episode we will talk about how secure remote access has evolved since the pandemic and how organizations can align their security strategy to account for a permanently hybrid workforce.Guests: Garrett Bekker, Principal Research Analyst, 451 Research, part of S&P Global Market Intelligence; Julie Preiss, Chief Marketing Officer, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
Moving workloads from legacy infrastructure to agile cloud environments is no small feat. But that's only half the battle. Too many times, securing access to cloud environments is an afterthought instead of being embedded in overall digital transformation strategies. Let's look at how Zero Trust security is a force multiplier for even greater agility and DevOps productivity as organizations accelerate cloud initiatives.Guests: Jim Anthony, SVP of Cybersecurity, Appgate; Michael Friedrich, VP of Federal Technology, Strategy and InnovationModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.
This episode is dedicated to understanding the emerging SASE and Zero Trust paradigms. What are they designed to solve? How are they similar? What can they achieve? Let's break them down to their simplest forms.Guests: Colby Dyess, Director of Product Management, Appgate; and Aaron Palermo, Senior Solutions Architect, AppgateModerator: George Wilkes, VP of Demand Generation, Appgate Visit www.appgate.com for more Zero Trust security resources.
Zero Trust is one of the most misunderstood and misused concepts in security right now. That's no surprise given the level of hype and marketing around it. Let's break it down to its core. What actually is Zero Trust and what isn't? We'll explain its origin, how we got here and how you can start to frame Zero Trust within your organization. Guests: Jerry Chapman, Engineering Fellow, Identity and Access Management, Optiv; and Jason Garbis, Chief Product Officer, Appgate. Jerry and Jason are co-authors of the book Zero Trust: An Enterprise GuideModerator: George Wilkes, VP of Demand Generation, Appgate Visit www.appgate.com for more Zero Trust security resources.
The past 18 months have pelted security teams with remote work, rampant ransomware, and oh yeah, a global pandemic. At the same time, shifts in IT and digital business have made cybersecurity even more challenging. Not to mention a confusing vendor marketplace. In short: chaos. How is a Zero Trust security strategy poised to control some of this chaos? Let's investigate.Guests: Dr. Chase Cunningham, a.k.a. Dr. Zero Trust; and Jason Garbis, Chief Product Officer, Appgate Moderator: George Wilkes, VP of Demand Generation, Appgate Visit www.appgate.com for more Zero Trust security resources.