Contact Us   |   Print Page   |   Sign In   |   Register
November 2018 ISSA Web Conference




ISSA Thought Leadership Series: Micro-Segmentation 101

Recorded (1 Hour Event) on Wednesday, November 14, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Overview:

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.


YOU'LL LEARN...

Why you need micro-segmentation
How micro-segmentation works
The 5 steps to implementing a micro-segmentation strategy for your data center and cloud


 

Moderator:

David Vaughn, ISSA International Board of Directors Chairperson for Education & Professional Development

David Vaughn is a decorated military combat veteran. He is an accomplished Information Security Professional with over 20 years of Information Security experience. He maintains a broad range of experience from Enterprise Mobility, to Network Security Infrastructure design and testing. He has managed personnel, provided technical oversight for incident response and countermeasures, performed individual and team-based network assessments, information security R&D consulting, and computer forensics. David has a proven track record demonstrating the ability to effectively understand and communicate contextual business requirements to both technical and non-technical groups at any level of leadership to help customers achieve compliance within various regulatory bodies




Speakers:

Vijay Chauhan, Senior Director of Product Marketing, Illumio

Vijay Chauhan is Senior Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, Vijay spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. Vijay started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank, handling core information security functions including Security Operations, Risk, Security Engineering, Application Security, and Identity & Access Management. Vijay has a BS in Computer Science from Cambridge, MA in Sanskrit from UPenn, and MS in Computer Science from Stanford.

 

Branden Williams, Director, Cyber Security, MUFG Union Bank N.A.

Dr. Branden R. Williams has more than twenty years of experience in business, technology, and information security as a consultant, leader, and an executive. His specialty is navigating complex landscapes—be it compliance, security, technology, or business—and finding innovative solutions that propel companies forward while reducing risk.


John Donovan, ISSA Silicon Valley Chapter & Rook Security

John is past-president and a board director of the Silicon Valley ISSA Chapter (https://sv-issa.org/). He’s a member of the CaC (CISO Advisory Council) for the ISSA’s CISO Executive Forum and participant in a number of security events including past CISO Executive Forums, ISSA International and regional conferences such as the Cornerstones of Trust conference (https://cornerstonesoftrust.com/) in the San Francisco Bay Area. John is a passionate supporter of both the local arts community and cyber-security community in the Silicon Valley and beyond. In his day job, John builds and runs security programs and is currently CISO for an early-stage security technology startup. Past professional positions include developing and managing Security, Risk, IT, and engineering programs for Illumio, Veracode, NetApp, Xilinx, and other technology and security companies .

Community Search
Sign In


Calendar

12/12/2018
ISSA Thought Leadership Series: 2018 User Risk Report

1/9/2019
ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

3/2/2019 » 3/3/2019
March CISO Forum San Francisco, CA

3/5/2019
Member Reception Party at RSA Conference 2019




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information