Loading Events

Leveraging an identity-centric Zero Trust model to plan your IAM strategy

Home » Events » Leveraging an identity-centric Zero Trust model to plan your IAM strategy

  • This event has passed so registration is closed.



Date and Time

September 28, 2020 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference


Candice Benson


Lisa O'Connell


The need to enable mass work from home has left many organizations looking for new approaches to IAM. Now is the time to assess how identity-centric Zero Trust models offer an effective strategic framework for transforming security schemes, and facilitating our users’ need for anywhere, anytime access to cloud applications and services.
During this session we’ll discuss:

• Limitations of existing perimeter security models
• The Zero Trust alternative:
• Benefits of Zero Trust
• How zero trust concepts can address the fast moving needs related to COVID, and the new ‘work from home’ normal
• The advantages of identity-centric zero trust for modernizing IAM schemes


Robert Martin – Sr. Security Engineer, Cisco Systems Inc.

Robert Martin is a Certified Information Systems Security Professional with over thirteen years of experience in information security. He holds a Master of Science in Network Technology with a concentration in Information Security. He also holds a Cyber Security Masters Certification. He is a Sr. Security Engineer for Cisco Systems, Inc. in RTP, NC. Robert specializes in areas such as risk management, regulatory compliance, security solutions architecture, security audits, vulnerability assessments, and penetration testing. From 2012-2015, Robert served as President of the Raleigh Chapter of the Information Systems Security Association. During that time, the chapter membership grew at a rate of 125%. Currently, Robert serves on the Raleigh ISSA Board as the Sponsorships Director. Robert is committed to serving the community through outreach by expanding the chapter’s mission to students and military. He has held several other IT Security Advisory Board positions over the years with a focus to bring about awareness of information security threats in an ever-changing global IT Security economy.

See Robert Martin‘s full profile.


Asaf Lerner – Director of IAM Solutions, AMER, Thales

Asaf Lerner brings with him over 20 years of swimming in the high IAM seas, serving in different positions in the industry, from R&D management to PKI and Authentication Product Management and various market-facing roles. Located in Austin, TX, Asaf is in charge of the IAM solutions market for the Americas at Thales Cloud Protection & Licensing (formerly Gemalto/SafeNet). Under his responsibility is creating market awareness of Thales’s IAM solutions, enhancing market partnerships, and creating healthy channel workstreams. He likes long-distance running and thinks he’s good at Ping Pong.

See Asaf Lerner‘s full profile.

Spencer Wilcox – Senior Director, CISO, Cybersecurity & Technology Risk, Nextera Energy

Spencer Wilcox is Senior Director, CISO, Cybersecurity & Technology Risk of Nextera Energy, and its subsidiaries, including Florida Power and Light. In that role Spencer is accountable for the delivery of the organizational cybersecurity strategy, governance, architecture and operations of cybersecurity products and services across NextEra’s fleet of generation, transmission, distribution, and commercial assets.

Spencer is an experienced utility industry veteran, with senior leadership experience in the strategic delivery of technology, cyber and physical security services, and actively engages in setting security and policy direction for industry with chair roles in the industry’s Cyber Mutual Assistance Program, and Edison Electric Institute’s Security Technology and Policy Executive Advisory Committee. Spencer holds certifications in cybersecurity, IT audit, and physical security, and is working to complete his PhD from New Mexico Tech.

Specialties: Strategic Vision, Planning and Preparedness, Crisis Management and Resilience, Cyber Security Leadership; Cyber Security Risk Management; Security Strategy and Governance; Program Design; Mobile Device Security; Operational Technology and IoT Security; Privacy and Data Security.

See Spencer Wilcox‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top