IT Summit - Spring
Monday-Tuesday, May 1-2, 2017
SynerComm's 15th Annual IT Conference at Historic Lambeau Field
Presentation: Empower Your Business Using Zero Trust Architecture
Tuesday • 8:45AM - 9:45AM
• Room: Johnny Blood/Willie Davis Room
Abstract
In this presentation, John Kindervag, creator of the revolutionary Zero Trust Model of Cybersecurity, will discuss the concept of Zero Trust and explain how it can not only transform network security but function as a business enabler. Zero Trust is revolutionizing network security architecture because it is data-centric and designed to stop data breaches. Additionally, Zero Trust adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
Presented by
John Kindervag
Field CTO
Palo Alto Networks
Bio
John Kindervag joined Palo Alto Networks as Field CTO in 2017 after eight and one half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world's foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.
Zero Trust is widely embraced by companies as diverse as Coca Cola, Google, and WestJet Airlines. Notably, the US House of Representatives is recommending that all government agencies adopt Zero Trust in the wake of the OPM Data Breach.
The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf. Additionally, Chairman Jason Chaffettz wrote a bylined article in Federal News Radio endorsing Zero Trust. These recommendations have led to increasing adoption of Zero Trust within the United States Federal Government.He currently advises both public and private sector organizations with the design and building of Zero Trust Networks and other Cybersecurity topics. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH, and CCNA. John has a practitioner background, having served as a security consultant, penetration tester, and security architect. He has particular expertise in the areas of secure network design, wireless security, and voice-over-IP hacking. He has been interviewed and published in numerous publications, including The Wall Street Journal, Forbes, and The New York Times. He has also appeared on television networks such as CNBC, Fox News, PBS, and Bloomberg discussion information security topics. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec Europe, and InfoSec World. John has a Bachelor of Arts degree in communications from the University of Iowa and lives in Dallas, TX.