PLAY RECORDING

Broadcast Date: Tuesday, May 24, 2022
from 12:00 pm to 1:30 pm (ET)

Overview:

The looming threat of cloud and network security risk exposures has compelled organizations to actively bolster their data systems and cyber resiliency now more than ever. In response to the growing ineffectiveness of network perimeter defenses, businesses have increasingly turned to a “Zero-Trust approach” to strengthen defenses against sophisticated cyber-attacks. Zero-Trust is a rising security model that restricts access control to a wider environment by eliminating implicit trust, without sacrificing performance and user efficiency. In a recently issued executive order, President Biden endorsed Zero-Trust as the blueprint for a more secure future, mandating the security architecture for all governmental entities.

While these developments present opportunities for organizations to level up their cybersecurity programs, businesses should be aware of the unique considerations that come along with implementing a Zero Trust model.

Tune in on May 24, 2022, as a panel of distinguished IT professionals organized by The Knowledge Group, provide a comprehensive discussion of the Zero Trust approachSpeakers will offer practical tips and strategies appropriate for businesses to manage security threats.

The webinar will cover key topics including:

  • Overview of the “Zero Trust” Security Model
  • Increasing Endpoint Security Visibility and Control
  • Practical Tips and Strategies
  • Bolstering Cybersecurity with the Right Zero Trust Approach
  • Current and Emerging Trends

Credit:

Course Level:

Intermediate

 

Advance Preparation:

Print and review course materials

 

Method of Presentation:

Live Webcast

 

Course Code:

149070

 

NY Category of CLE Credit:

Law Practice Management

 

Prerequisite:

General Knowledge of cybersecurity

 

Total Credit:

1.5 CLE

Speaker Panel:

John Knopf, Senior Vice President Secure Access Product Management
Absolute Software

John Knopf joins Absolute as the Senior Vice President of Secure Access Product Management after leading the strategy and direction of the former NetMotion’s product portfolio since 2002. He has over 30 years of software industry experience with early-stage and mid-stage companies, and has led numerous products from inception to launch with commercial success. John has a Bachelor of Arts degree from Brigham Young University and was once shot in the chest by his father (we think accidentally, but the jury’s still out). Thankfully, it was a ricochet bullet and bounced off. Clearly, he survived.

Jason Short, Vice President of Product Management
Absolute Software

As Vice President of Product Management for Absolute Software, Jason plays a leading role in developing and executing the company’s product strategy and roadmap, and delivering innovative security and enterprise resilience solutions to end customers. Before joining Absolute, Jason spent nearly a decade in the security space, most recently serving as the Director of Product Management at Symantec. He’s also held management roles at Apple, 3Com, Celerity and BuilderMT. Jason has more than 15 years of experience in product development, management and engineering.

Carolyn Purwin Ryan, Partner
Data Privacy and Security Breach Coach

Mullen Coughlin

Carolyn Purwin Ryan is a Partner at Mullen Coughlin. She serves as breach counsel and provides third-party privacy defense legal services. She also aids clients in incident response planning, including tabletop exercises, assessment of regulatory compliance requirements and inquiries from regulators on both the state and federal levels. Ms. Ryan serves as a breach counsel to companies in various areas including healthcare institutions, construction companies, managed service providers, municipalities, professional services, retail, technology and financial institutions. She leads response investigations, guidance in governmental investigations, mitigation and restoration services. Ms. Ryan counsels clients on development of risk assessment policies, vendor agreement analysis and implementation of data privacy practices.

Carolyn was named a Pennsylvania “Rising Star” by Super Lawyers in 2018 and 2019.

Agenda:

Segment 1

John Knopf, Senior Vice President Secure Access Product Management

Absolute Software

and

Jason Short, Vice President of Product Management

Absolute Software

  • Review tenants of ZT and why you'll need it
  • Addressing misconceptions around ZT
  • Converging paths to ZT

 

Segment 2

Carolyn Purwin Ryan, Partner, Data Privacy and Security Breach Coach

Mullen Coughlin LLC

  • Trends on Ransomware
  • Incident Response Planning
  • Tips on Prevention/Remediation Prior to an Incident

Date & Time:

Tuesday, May 24, 2022

12:00 pm to 1:30 pm (ET)

Materials:

Download Course Materials

Who Should Attend:

  • Cybersecurity Lawyers
  • Chief Information Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Chief Risk Officers
  • Chief Compliance Officers
  • Chief Operations Officers
  • VPs/Directors/ of IT
  • VP/Directors of Information Security
  • Information Security Managers
  • IT Managers
  • Cybersecurity Directors/Managers
  • IT Auditors
  • IT Operations Managers
  • Internal Auditors
  • Data Security Analysts
  • IT Analysts

SPONSOR

SPEAKERS

John KnopfSenior Vice President Secure Access Product Management
Absolute Software
Jason ShortVice President of Product Management
Absolute Software
Carolyn Purwin RyanPartner
Data Privacy and Security Breach Coach
Mullen Coughlin

SUBSCRIPTION PACKAGES

ALL-ACCESS PASS

View Details

CLE LAW MONTHLY

View Details

CPE FINANCE MONTHLY

View Details

Join Over 150,000 Professionals Empowering Their Careers

Learn anywhere from over 1800+ live and recorded CLE CPE & Technology webcasts.