Implementing Zero Trust Architecture and Beyond

Starts:  Jun 25, 2024 09:00 (ET)
Ends:  Jun 26, 2024 17:00 (ET)
Associated with  New York Metropolitan Chapter

Implementing Zero Trust Architecture and Beyond: A Practical Guide for IT Auditors and Security Professionals

This event registration day will be closed on June 1,  2024 at 8 pm

We recommend registering for this class using your private email address and not your organization's email address as many organizations block emails with attachments and block Webex links.

Dates and Times: All times are New York time (Eastern Standard Time). Please click here to check time and date in your location. 

Dates: Tuesday, June 25 & Wednesday, June 26, 2024.
Time: 9 am to 5 pm EST
CPEs: 14
Course information:
This 2-day course on Zero Trust addresses Architecture on the first day; and the Environment on the second day.

Zero Trust Architecture (ZTA) is a concept much talked about but not as widely understood or implemented. Still, it is quite obvious the future of Information Security, and IT Auditors and Information Security professionals need to understand Zero Trust’s concepts, commercial availability, and implementation directions. 

There are many elements of information security that are implied in ZTA but are not explicitly stated. These constitute the Zero Trust Environment, which must be in place for the architecture to be implemented. 

Taken together, ZTA and these environmental elements are the basis for secure use of information resources, today and as a foundation for future growth. This seminar/workshop presents the strengths and impediments of implementing a Zero Trust Environment and what needs to be done to achieve the objectives of this architecture. 

Participants in this seminar will learn:  

Day 1:  Implementing Zero Trust Architecture: A Practical Guide for IT Auditors and Security Professionals

  • Why an Information Security Architecture is needed
  • What Zero Trust Architecture is and how it is supposed      to work
  • The factors impeding the implementation of Zero Trust
  • How the Zero Trust eXtended (ZTX) Ecosystem supports the architecture 
  • What are the commercial Zero Trust products in the marketplace and how they differ
  • What is the process for implementing Zero Trust Architecture

Day 2:  Implementing the Zero Trust Environment: Completing the Journey to Zero Trust

  • The various security methods that support Zero Trust Architecture but are not included      in it
  • The value proposition for a fully supported Zero Trust environment
  • The vendor landscape of these supportive methods
  • Determining the need for supplemental products and tools 
  • Managing “trust” in a Zero Trust environment

Integrating support tools into a Zero Trust Architecture implementation
Seminar outline:  Please refer to the Agenda page; Click Here

Instructor: Steve Ross, Risk Masters International LLC

Who Should Attend: IT Auditors, Information Security professionals, Risk Managers, System Architects

  • CPE Credits: 14    Capacity:  webinar - 35 people.
  • Refund policy: Refund requests must be submitted in writing only to education@isacany.org.  A 100% refund will only be awarded for a written request made on or before June 1, 2024.  Note: once this date has passed or class materials or Zoom links have been provided,  refunds will not be awarded for any cancellation/refund request.

Location

Online Instructions:
Register Now