** Test Mode **

  0.00 (USD)

This Package provides access to the entire event

Registration Header
REGISTER TODAY!

12.21 Beyond Identity- Zero trust & the ID-based cybersecurity perimeter

Start Date:12/21/2020

Start Time:12:00 PM EST

Duration:60 minutes

Abstract:

The rapid adoption of cloud-first strategies — across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) — combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.

This webinar will discuss:

• the impact of cloud first;

• how organizations are adopting identity-based perimeters as a fundamental Zero Trust building block; and

• the implications for Identity and Access Management tooling moving forward.




Attendees of this webcast may be eligible for one CPE credit

If you're already registered for the 12.21 Beyond Identity- Zero trust & the ID-based cybersecurity perimeter webcast, click below:

ALREADY REGISTERED?

Speakers

Jasson Casey

Chief Technology Officer

Beyond Identity

Jasson has served as CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity, Founder and Executive Director of Flowgrammable as well as Compiled Networks, VP of VoIP Product Development at CenturyTel, among other technical and executive roles.

Patrick McBride

Chief Marketing Officer

Beyond Identity

Patrick has served as CMO of ZeroFOX and Claroty, as VP of Marketing at iSIGHT Partners and Xceedium, VP of Compliance at Scalable Software, Co-founder and CEO of META Security Group, and Senior Vice President at META Group. Patrick received a bachelor's degree in management from Keene State College in New Hampshire.

Jill Aitoro

Editor in Chief

SC Media

Share on Facebook Share on Twitter Share on Linkedin Share through Email

Sponsors

Sponsor Image
12.21 Beyond Identity- Zero trust & the ID-based cybersecurity perimeter
Registration Is Closed
© 2025 Notified. All rights reserved.
Already Registered? Technical Requirements System Check Port Troubleshooting