Find out what's inside the May 2021 edition of the Journal & download a free copy of this month's featured article
2020 was an eventful year for cybersecurity, with an unprecedented rise in cyberattacks. Many organizations were caught off guard as the pandemic accelerated and dictated the need for remote work and education. However, the accelerated move to everything cloud has left many wondering about the future, whether their on-premises investments have been rendered obsolete or if the “new normal” would only rely on cloud-only solutions.
The pandemic has also highlighted the need for fool-proof Zero Trust implementations to enhance the security of networks against modern cyberattacks, whether they are initiated from the outside or within. However, with most internet traffic encrypted, it is becoming increasingly difficult to effectively implement a Zero Trust approach.
In this webinar, we will discuss:
- What the “new normal” of cybersecurity might look like in a post-pandemic world
- What role will Zero Trust play in the future of cybersecurity
- Why effective decryption is essential for a fool-proof Zero Trust implementation
Alex Grohmann – Founder, Sicher Consulting
Mr. Grohmann (CISSP, CISA, CISM and CIPT) is founder of Sicher Consulting and an ISSA Fellow. He is the recipient of ISSA ‘Honor Roll’ and was president of the NoVa chapter for three years, winning Chapter of the Year during that time. He is a graduate of the FBI’s Citizens’ Academy and served on the board of directors for the Washington DC chapter of InfraGard for four years. Currently Mr. Grohmann serves on the board of directors of Northern Virginia Community College’s Workforce Development taskforce, NOVA Cybersecurity Advisory Board and is an mentor at MACH 37, the Virginia cyber security accelerator. He also sits on the IT sector coordinating council (IT-SCC)
Doug McKillip – Solutions Architect, A10 Networks
Currently I am a Solutions Architect for the SSLi Insight Solution (SSL visitillity) offered by A10 Networks. Besides providing product implementation consulting services, I have had experience integrating our solution into networks with security appliances offered by about a dozen different vendors. I have also managed one of our internal Data Centers.
Prior to this I had been a Computer Network Security consultant specializing in Cisco Systems authorized training in the area of firewalls, intrusion detection and prevention, virtual private networking, and basic router and switch security. I have provided consulting in these areas both on-site and remotely.
Babur Nawaz Khan – Product Marketing Manager, A10 Networks
Extensive experience with enterprise security solutions including SSL/TLS decryption/visibility, Convergent Firewall, SaaS optimization, security & visibility, and DDoS mitigation/protection.
Hands on experience with L4-L7 networking technologies including SSL/TLS, ADC, and SLB.
Extensive experience with a broad range of operating systems including Windows and Linux.
Hands on experience with VMWare Workstation and vSphere Suite including vSphere, ESXi and vCenter.
Good with switching and routing protocols like BGP, OSPF as well as IPv4 and IPv6.
Sound knowledge of TCP, HTTP, SSL and other application layer protocols.
Strong interpersonal and technical writing skills.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.