Broadcast Date: Wednesday, June 10, 2020
from 12:00 pm to 1:30 pm (ET)


In today’s business climate where sophisticated cyberattacks continue to challenge organizations, cybersecurity programs must be anchored around the “zero trust” principle. This approach is a security scheme designed to ensure that critical assets are accessed by authenticated and authorized users only, preventing potential outside and inside threats.

To leverage its potentials, organizations must thoroughly understand zero-trust architecture. They must also be critical in selecting a technology solution that could help them efficiently integrate the zero-trust model in their cybersecurity programs.

Join cybersecurity experts Rashid Ali (WALLIX) and Michael Scheidell (Cloud Computing Concepts LLC) as they delve into a comprehensive discussion on how to level up cybersecurity with the zero-trust approach. Speakers will offer practical tips and strategies for a more efficient cybersecurity program.

This LIVE Webcast will discuss the following:

  • The Zero Trust Cybersecurity: An Overview
  • Top Cybersecurity Threats
  • Maximizing the Zero Trust Approach
  • Selecting an Effective Technology Solution
  • Managing Risk Issues


Course Level:



Advance Preparation:

Print and review course materials


Method of Presentation:

On-demand Webcast (CLE)



General knowledge of cybersecurity


Course Code:



NY Category of CLE Credit:

Law Practice Management


Total Credits:

1.5 CLE

Speaker Panel:

Rashid Ali, Enterprise Sales Manager UK Nordics

Rashid Ali has over 20 years’ experience within the cybersecurity industry both in the UK and abroad. He has worked on major projects throughout his career with some of the largest companies in the world, and has a deep understanding of the challenges organizations are facing when it comes to cybersecurity. Rashid joined WALLIX in 2018 to develop the UKI and Nordic Markets, helping organizations protect their critical assets, and working with channel and technology partners to develop awareness about the need for privileged access and identity management.

Michael Scheidell, Chief Information Security Officer
Cloud Computing Concepts LLC

Chief Information Security Officer for Security Privateers a Security Management consulting firm specializing in providing guidance and cybersecurity team management for medium to large enterprise.

Scheidell currently works as the CISO for Cloud Security Concepts (C3) and three other organizations including 2 Law firms and one hedge fund research Firm. Previous accomplishments include inventing and patenting a managed IPS that was used to protect US State Department SCIF and Top-secret information.

A recognized expert in the information security and privacy community with over 20 years of experience in security and privacy and a strong history of innovation and entrepreneurship.

Mr. Scheidell is a frequent conference speaker and subject matter expert in Information Security, Governance Risk, Compliance, and corporate physical security and has worked to secure US critical infrastructure such as Rail, Transportation and Utility companies.

Mr. Scheidell has patents in information security, holds several security certifications, as member of the US Secret Service Electronic Crimes Task Force, and FBI’s InfraGard, has consulted on multiple cybersecurity issues.

Scheidell is a senior IEEE member, senior member of ISSA, platinum member of ISACA and serves as the president of the Cloud Security Alliance, South Florida Chapter.


Rashid AliEnterprise Sales Manager UK Nordics


  • Zero Trust is a key principle. It addresses security by establishing that no one should have privileges to access IT assets by default, and everyone must prove their identity and eligibility before access is allowed – a critical factor!
  • Similar to the Principle of Least Privilege, a Zero Trust framework means no one is assumed to a.) be who they say they are, b.) have the right to access resources whenever they wish, and c.) do whatever they want with that access. Zero Trust = controlling the who, what, and when of activity on IT assets.
  • Technologies like Privileged Access Management and Endpoint Management empower organizations to implement Zero Trust without creating complex or disruptive processes for their users, offering tight security and business productivity
  • The right solutions also enable complete monitoring, recording, and traceability of what privileged users are doing once inside the network. Whether for training purposes, audit after an incident, or proof of regulatory compliance, this in-depth visibility and oversight is an important aspect of true Zero Trust.

Michael ScheidellChief Information Security Officer

Cloud Computing Concepts LLC

  • Humans have struggled with protecting their property since we learned to fight off attacks and hide behind castle walls.
  • Protecting information assets are no different, and we need to transition from protecting the ‘walls’ (network) to protecting the assets themselves. Even with solid walls, the scullery maid can let the joker in.  Zero Trust is a part decision and part commitment to shift protection from the walls to the crown jewels by enlisting ‘guards’ inside the room as well as outside.

Date & Time:

Wednesday, June 10, 2020

12:00 pm to 1:30 pm (ET)

Who Should Attend:

  • Chief Information Security Officers
  • Chief Security Officers
  • Chief Information Officers
  • Chief Technology Officers
  • VPs and Directors of IT
  • System Administrators
  • Senior Security Engineers and Architects
  • Network Administrators
  • C-Level Executives
Preventing Ransomware Attacks: A Practical Guide to Enhancing IT Security and Resiliency,
Speaker Preferred Package (Online Payment)
Asbestos Litigation: Demystifying Trends, Developments, and Defense Strategies,
New York Online CLE Bundle
Pennsylvania Online CLE Bundle
California Online CLE Bundle
Supercharging Privilege Review With AI, Analytics, and Automation,
The Hows and Whys of Child Abuse Reporting: A Comprehensive Ethical Guide for Lawyers,
Understanding R&D Tax Credits and Amortization: Navigating Changes and Maximizing Benefits,
Maximizing Your Innovation ROI: R&D Tax Credits in 2024 and Beyond,
Winning Patent Litigation: Essential Strategies and Tactics,
Asbestos Litigation: What's Changing in 2024 and Beyond,
Cartel Investigations: A Blueprint for Defense,
Navigating the Evolving Patent Damages Landscape: Key Insights and Best Practices,
Demystifying Economic Sanctions: Strategies for Success in a Global Economy,
Antitrust 'No-Poach' Agreement Enforcement: Key Focus Areas in 2024,
Practical Trademark Perspectives from U.S. and Canadian Counsel,
Effectively Manage KYC Compliance: Keep Up with the Times by Getting Back to Basics,
OFAC Regulations and the Economic Sanctions Compliance Programs: Best Practices,
'Zombie' LIBOR for USD Contracts: Navigating the Critical Issues, ,
Calculating Lost Profits in Construction Claims: A Practical Guide,
False Claims Act and COVID-19 Implications: Key Considerations and Best Practices, ,


Rashid AliEnterprise Sales Manager UK Nordics
Michael ScheidellChief Information Security Officer
Cloud Computing Concepts LLC



View Details


View Details


View Details

Join Over 160,000 Professionals Empowering Their Careers

Learn anywhere from over 3000+ live and recorded CLE, CPE & Technology Webcasts.