- This event has passed so registration is closed.
The need to enable mass work from home has left many organizations looking for new approaches to IAM. Now is the time to assess how identity-centric Zero Trust models offer an effective strategic framework for transforming security schemes, and facilitating our users’ need for anywhere, anytime access to cloud applications and services.
During this session we’ll discuss:
• Limitations of existing perimeter security models
• The Zero Trust alternative:
• Benefits of Zero Trust
• How zero trust concepts can address the fast moving needs related to COVID, and the new ‘work from home’ normal
• The advantages of identity-centric zero trust for modernizing IAM schemes
Robert Martin – Sr. Security Engineer, Cisco Systems Inc.
Robert Martin is a Certified Information Systems Security Professional with over thirteen years of experience in information security. He holds a Master of Science in Network Technology with a concentration in Information Security. He also holds a Cyber Security Masters Certification. He is a Sr. Security Engineer for Cisco Systems, Inc. in RTP, NC. Robert specializes in areas such as risk management, regulatory compliance, security solutions architecture, security audits, vulnerability assessments, and penetration testing. From 2012-2015, Robert served as President of the Raleigh Chapter of the Information Systems Security Association. During that time, the chapter membership grew at a rate of 125%. Currently, Robert serves on the Raleigh ISSA Board as the Sponsorships Director. Robert is committed to serving the community through outreach by expanding the chapter’s mission to students and military. He has held several other IT Security Advisory Board positions over the years with a focus to bring about awareness of information security threats in an ever-changing global IT Security economy.
Asaf Lerner – Director of IAM Solutions, AMER, Thales
Asaf Lerner brings with him over 20 years of swimming in the high IAM seas, serving in different positions in the industry, from R&D management to PKI and Authentication Product Management and various market-facing roles. Located in Austin, TX, Asaf is in charge of the IAM solutions market for the Americas at Thales Cloud Protection & Licensing (formerly Gemalto/SafeNet). Under his responsibility is creating market awareness of Thales’s IAM solutions, enhancing market partnerships, and creating healthy channel workstreams. He likes long-distance running and thinks he’s good at Ping Pong.
Spencer Wilcox – Executive Director of Technology and Chief Security Officer, PNM Resources
Spencer Wilcox is Executive Director of Technology and Chief Security Officer at PNM Resources, an investor owned utility headquartered in Albuquerque, NM. Spencer is accountable for the secure operations of enterprise IT and OT Infrastructure, Network and Telecommunications, Technology Innovation and the Cyber and Physical Security of the enterprise and the electric grid. In this role he strategically leads leaders to continuously improve operational effectiveness using a risk based approach to technology and security.
Spencer is a nationally recognized speaker, and regular contributor to (ISC)2, ASIS, and SC Congress events. He regularly serves in volunteer capacities to improve cyber security, technology innovation and economic development. He currently serves as Vice Chair of the ICCS committee for the Electric Power Research Institute, and as co-chair of the Security and Technology Policy Executive Advisory Committee for the Edison Electric Institute.
He has previously served as a judge in the SC awards, and Maryland Cyber awards and as a volunteer on the boards of directors for the Virginia Crime Prevention Association, the Cybersecurity Association of Maryland, Inc, and the Fort Meade Alliance.
Specialties: Strategic Vision, Planning and Preparedness, Cyber Security Leadership; Cyber Security Risk Management; Security Strategy and Governance; Program Design; Mobile Device Security; Operational Technology and IoT Security; Privacy and Data Security.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.