- This event has passed so registration is closed.
Globally, firms face a dynamic cybersecurity threat landscape. To combat new threats to remote workers, many firms have reacted with point products to secure their new perimeter. However, this has resulted in increased costs, marginalized impact, and lower ROI.
In order to achieve true resiliency, firms need to rethink their approach and adopt a holistic Zero Trust model that is long-term and cost-effective.
Join our panel of experts on Dec. 8th at 10 am PT as they explore the new Zero Trust security paradigm. In this session, they’ll cover:
• What Zero Trust is and what it isn't
• Why firms are rapidly adopting this model
• Where change will be most effective, most disruptive, and most challenging
Jonathan Fowler – CISO, Consilio
At Consilio, Jonathan led the effort to develop, implement, and monitor a rigorous global Information Security Management System to ensure compliance with ISO/IEC 27001 and SOC 2, Type 2 controls. Working in conjunction with the General Counsel and CIO, he currently directs all IT efforts to comply with global, national, and state privacy regulations and frameworks such as GDPR, Privacy Shield, HIPAA, and various U.S. and German state-level privacy regulations.
In a 3-year period, as the company more than quintupled in total revenue, he was responsible for growing the Information Security team from 3 to 10 full-time employees, while managing overall personnel costs and maintaining operational effectiveness by staffing positions in lower cost locations throughout the company.
As part of a comprehensive company-wide metrics initiative, they identified measurable trends in user activity in various departments pertaining to enterprise-wide Data Loss Prevention program that enabled the identification and prevention of sensitive internal corporate data leaving the company.
Jonathan has extensive experience briefing both the senior executive team and board of directors on issues pertaining to Information Security and Cyber Risk Management. Currently, He assists the CIO in global strategic planning, to include technology risk assessments for potential merger/acquisition targets. He leads the company's cross-functional Data Breach Incident Response team and regularly work with leaders of all operational groups to ensure that any security incidents are reported and mitigated in a timely manner.
John Checco – Leader for the CISO Advisory Board, Proofpoint
John C. Checco is an information security professional providing subject matter expertise across various industries. He currently resides as leader for the CISO Advisory Board on Financial Services for Proofpoint, and President Emeritus of the New York Metro InfraGard Members Alliance (an FBI public/private partnership program). John specializes in the areas of Zero-Trust Strategies, Responsible Automation, Biometric Security and Cyber-Physical coordinated threats on critical infrastructures.
Jon Green – Vice President and Chief Technologist for Security and Government Solutions, Aruba
Jon Green is Vice President and Chief Technologist for Security and Government Solutions at Aruba, a Hewlett Packard Enterprise company. He is responsible for providing technology guidance and leadership for all security solutions including authentication and network access control, cryptography, PKI, firewall, VPN, and secure product development. He manages Aruba’s Product Security Incident Response Team (PSIRT), Aruba Threat Labs, and Aruba’s Trust and Assurance office, and is a member of the HPE Cybersecurity Governance Committee and the HPE Enterprise Risk Council. Jon joined Aruba in 2003 and helped it grow from a small startup to today’s position as a leading provider of secure network solutions. Prior to Aruba, Jon held product management, marketing, and sales positions with Foundry Networks, Atrica, Nortel Networks, and Bay Networks. Jon holds a B.S. in Information Security from Western Governor’s University, a M.S. in Computer Science/Information Security from James Madison University, and CISSP, CISM, and CCSP certifications. Outside of work, he is a commercial-rated airplane pilot and flight instructor, an aspiring banjo player, and a competition barbecue judge.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.