As networks continue to increase in complexity and riskmore companies are adopting the Zero Trust model. However, implementing Zero Trust is a journey and knowing where to start can be challenging.  

In this webinar, we will show you how to prioritize the stages of your Zero Trust journey - by identifying and securing your biggest risks first and gaining maximum value in the shortest timeframe. 

Join us and learn how to: 

        • Mitigate the risk that comes from the excessive access rights required for third-party contractors, vendors and partners 
        • Enable your developers to preserve their existing working environments while protecting your ‘crown jewels’ with source code protection 
        • Secure OT environments, which are experiencing increased risk due to today's inevitable transition to remote working 
        • Enable employees to work from home securely and productively. Offload VPNs and other systems for a more secure and better user experience
        • Ensure continuous verification and monitoring before and after access is granted into the system 
        • Prevent lateral movement within the network 
almog-circle

PRESENTER

Almog Apirion
CEO & Co-Founder, Cyolo

Almog is the CEO and Co-Founder of Cyolothe Zero Trust Access platform. 

As a former CISO at Orbotech and Head of Cyber Security Unit of the Israeli Navy, he was driven to build a secure access solution that would answer the pain points that he dealt with on a daily basis for over a decade. 

Roncircle
PRESENTER
Ron Craig
Head of Security & IT, FreePoint

Ron has worked in tech for 25 years. He started as a programmer, moving on to video game creation and web development. 

For the past 10 years, he has focused on  IT and Cybersecurity and currently works as Head of IT and Cybersecurity for an SMB in Ontario, Canada. He runs his own copywriting business, focusing on cyber.   

alexcircle
PANELIST
Alexandre Blanc
Director of Security, Adaware

Alexandre Blanc became a cyber risk SME through 20+ years of intrastructure management, protecting and securing systems from online threats.

He loves to correlate information from OSINT, and draw global trends in cyber threat landscape. His hands-on experience in protecting sensitive infrastructures and daily threats trend analysis brought him to a key position in risk analysis overview and information sharing.