Broadcast Date: Tuesday, May 24, 2022
from 12:00 pm to 1:30 pm (ET)


The looming threat of cloud and network security risk exposures has compelled organizations to actively bolster their data systems and cyber resiliency now more than ever. In response to the growing ineffectiveness of network perimeter defenses, businesses have increasingly turned to a “Zero-Trust approach” to strengthen defenses against sophisticated cyber-attacks. Zero-Trust is a rising security model that restricts access control to a wider environment by eliminating implicit trust, without sacrificing performance and user efficiency. In a recently issued executive order, President Biden endorsed Zero-Trust as the blueprint for a more secure future, mandating the security architecture for all governmental entities.

While these developments present opportunities for organizations to level up their cybersecurity programs, businesses should be aware of the unique considerations that come along with implementing a Zero Trust model.

Tune in on May 24, 2022, as a panel of distinguished IT professionals organized by The Knowledge Group, provide a comprehensive discussion of the Zero Trust approachSpeakers will offer practical tips and strategies appropriate for businesses to manage security threats.

The webinar will cover key topics including:

  • Overview of the “Zero Trust” Security Model
  • Increasing Endpoint Security Visibility and Control
  • Practical Tips and Strategies
  • Bolstering Cybersecurity with the Right Zero Trust Approach
  • Current and Emerging Trends


Course Level:



Advance Preparation:

Print and review course materials


Method of Presentation:

On-demand Webcast


Course Code:



NY Category of CLE Credit:

Law Practice Management



General Knowledge of cybersecurity


Total Credits:

1.5 CLE

Speaker Panel:

John Knopf, Senior Vice President Secure Access Product Management
Absolute Software

John Knopf joins Absolute as the Senior Vice President of Secure Access Product Management after leading the strategy and direction of the former NetMotion’s product portfolio since 2002. He has over 30 years of software industry experience with early-stage and mid-stage companies, and has led numerous products from inception to launch with commercial success. John has a Bachelor of Arts degree from Brigham Young University and was once shot in the chest by his father (we think accidentally, but the jury’s still out). Thankfully, it was a ricochet bullet and bounced off. Clearly, he survived.

Jason Short, Vice President of Product Management
Absolute Software

As Vice President of Product Management for Absolute Software, Jason plays a leading role in developing and executing the company’s product strategy and roadmap, and delivering innovative security and enterprise resilience solutions to end customers. Before joining Absolute, Jason spent nearly a decade in the security space, most recently serving as the Director of Product Management at Symantec. He’s also held management roles at Apple, 3Com, Celerity and BuilderMT. Jason has more than 15 years of experience in product development, management and engineering.

Carolyn Purwin Ryan, Partner
Data Privacy and Security Breach Coach

Mullen Coughlin

Carolyn Purwin Ryan is a Partner at Mullen Coughlin. She serves as breach counsel and provides third-party privacy defense legal services. She also aids clients in incident response planning, including tabletop exercises, assessment of regulatory compliance requirements and inquiries from regulators on both the state and federal levels. Ms. Ryan serves as a breach counsel to companies in various areas including healthcare institutions, construction companies, managed service providers, municipalities, professional services, retail, technology and financial institutions. She leads response investigations, guidance in governmental investigations, mitigation and restoration services. Ms. Ryan counsels clients on development of risk assessment policies, vendor agreement analysis and implementation of data privacy practices.

Carolyn was named a Pennsylvania “Rising Star” by Super Lawyers in 2018 and 2019.


Segment 1

John Knopf, Senior Vice President Secure Access Product Management

Absolute Software


Jason Short, Vice President of Product Management

Absolute Software

  • Review tenants of ZT and why you'll need it
  • Addressing misconceptions around ZT
  • Converging paths to ZT


Segment 2

Carolyn Purwin Ryan, Partner, Data Privacy and Security Breach Coach

Mullen Coughlin LLC

  • Trends on Ransomware
  • Incident Response Planning
  • Tips on Prevention/Remediation Prior to an Incident

Date & Time:

Tuesday, May 24, 2022

12:00 pm to 1:30 pm (ET)

Who Should Attend:

  • Cybersecurity Lawyers
  • Chief Information Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Chief Risk Officers
  • Chief Compliance Officers
  • Chief Operations Officers
  • VPs/Directors/ of IT
  • VP/Directors of Information Security
  • Information Security Managers
  • IT Managers
  • Cybersecurity Directors/Managers
  • IT Auditors
  • IT Operations Managers
  • Internal Auditors
  • Data Security Analysts
  • IT Analysts



John KnopfSenior Vice President Secure Access Product Management
Absolute Software
Jason ShortVice President of Product Management
Absolute Software
Carolyn Purwin RyanPartner
Data Privacy and Security Breach Coach
Mullen Coughlin



View Details


View Details


View Details

Join Over 150,000 Professionals Empowering Their Careers

Learn anywhere from over 1900+ live and recorded CLE, CPE & Technology Webcasts.