On-Demand Webinar

How to Identify & Secure Your Biggest Access Risks

As networks continue to increase in complexity and risk, more companies are adopting the Zero Trust model. However, implementing Zero Trust is a journey and knowing where to start can be challenging.

In this webinar, we show you how to prioritize the stages of your Zero Trust journey - by identifying and securing your biggest risks first and gaining maximum value in the shortest timeframe. Watch it and learn how to:

  • Mitigate the risk that comes from the excessive access rights required for third-party contractors, vendors and partners
  • Enable your developers to preserve their existing working environments while protecting your ‘crown jewels’ with source code protection
  • Secure OT environments, which are experiencing increased risk due to today's inevitable transition to remote working
  • Enable employees to work from home securely and productively
  • Ensure continuous verification and monitoring before and after access is granted into the system
  • Prevent lateral movement within the network



About the Presenters

PRESENTER Almog Apirion CEO & Co-Founder, Cyolo

Almog is the CEO and Co-Founder of Cyolo, the Zero Trust Access platform.

As a former CISO at Orbotech and Head of Cyber Security Unit of the Israeli Navy, he was driven to build a secure access solution that would answer the pain points that he dealt with on a daily basis for over a decade.

PRESENTER Ron Craig Head of Security & IT, FreePoint

Ron has worked in tech for 25 years, He started as a programmer, moving on to video game creation and web development.

For the past 10 years, he has focused on IT and Cybersecurity and currently works as Head of IT and Cybersecurity for an SMB in Ontario, Canada. He runs his own copywriting business, focusing on cyber.

PANELIST Alexandre Blanc Director of Security, Adaware

Alexandre Blanc became a cyber risk SME through 20+ years of intrastructure management, protecting and securing systems from online threats.

He loves to correlate information from OSINT, and draw global trends in cyber threat landscape. His hands-on experience in protecting sensitive infrastructures and daily threats trend analysis brought him to a key position in risk analysis overview and information sharing.