Implementing Zero Trust Architecture: A Practical Guide for IT Auditors and Security Professionals

When:  Oct 23, 2025 from 09:00 to 17:00 (ET)
Associated with  New Jersey Chapter

As organizations rapidly adopt Large Language Models (LLMs) across business functions, cyber risk auditors and security professionals face an urgent need to secure these systems end-to-end. This 8-hour workshop bridges the gap between governance and technical implementation, guiding you through a practical, structured approach to building and assessing cybersecurity.

Zero Trust Architecture is a concept much talked about but not widely understood or implemented. Still, it is the future of Information Security, and IT Auditors and Information Security professionals need to gain an understanding of Zero Trust’s concepts, commercial availability and implementation directions. This event presents the strengths and impediments of implementing Zero Trust and what needs to be done to achieve the objectives of this architecture.

Agenda at a Glance

Session 1: 9:00 AM to 10:30 AM EST

A. Information Security architecture

  1. History
  2. Purpose
  3. Impediments
  4. Why we failed

B. Zero Trust Architecture

  1. History
  2. Key concepts
  3. Critical components

 

Break: 10:30 AM to 10:45 AM EST

 

Session 2: 10:45 AM to 12:00 PM EST

C. Impediments to implementation

  1. Mapping  to business needs
  2. Insecure identity
  3. Over-authorization
  4. Weak data management
  5. Incomplete knowledge of applications

 D. Zero Trust eXtended (ZTX) Ecosystem 

  1. Concepts       
  2. Reference architecture
  3. Extended timeframe 
  4. Overview of key components
  5. Case study #1

 

Lunch Break: 12:00 PM to 12:45 PM EST

 

Session 3: 12:45 PM to 3:00 PM EST

E. ZTX Product Categories

1. Components of a Zero Trust Ecosystem

2. Platform

3. Security Automation and Orchestration

4. Visibility and Analytics

5. People  

     i. Interaction

     ii. Identity

6. Workload

7. Data Security

8. Network Segmentation

9. Devices

10, Case Study #2

 F. The Zero Trust implementation process

  1. Roadmap
  2. Strategy
  3. Development of a reference architecture
  4. Administrative infrastructure
  5. Product acquisition
  6. Product retirement and replacement

 

 Break: 3:00 PM to 3:15 PM EST

 

Session 4: 3:00 PM to 4:45 PM EST

G. Products supporting Zero Trust

  1. Zero Trust Platform
  2. Security automation and orchestration
  3. Security visibility and analytics 
  4. People

 i. Interaction

 ii. Identity

  1. Workload security
  2. Data security
  3. Network segmentation
  4. Device security
  5. Case study #3

 H, Acquisition considerations

  1. Single or multiple vendors
  2. Products or services
  3. On-premises, in the cloud or hybrid

 

Session 5: 4:45 PM to 5:00 PM EST

15 mins: Conclusions Q&A

   

   

Location

Online Instructions:
Url: https://cvent.me/7LDYW4
Login: Link to the online event will be sent to registrants prior to the event date.
Event Image