Gurucul and Guest Analyst to Present Roadmap for Implementing a Zero Trust Model Using Security Analytics
Webinar Hosted by Gurucul featuring analyst Chase Cunningham will Discuss Best Practices and Real World Use Cases for Automating Security Controls
Gurucul, a leader in behavior based security and fraud analytics technology for on-premises and the cloud, announced it will present a webinar featuring Forrester on how to implement a Zero Trust security architecture using security analytics to automate risk assessment and policy enforcement.
Read More: Damon Unveils World’s Smartest, Safest, Fully Connected Motorcycle at CES 2020
Dr. Chase Cunningham, Principal Analyst, Forrester, guides enterprise initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. Prior to joining Forrester, he served as a director of cyber threat intelligence operations for security-as-a-service provider Armor, was computer network exploitation lead for Telecommunication Systems, and chief of cyber analytics for Decisive Analytics. A retired U.S. Navy chief, Dr. Cunningham spent more than 19 years working with the NSA, CIA, FBI, and other government agencies on operationalizing security operations command systems and centers.
Craig Cooper, Chief Operating Officer, Gurucul, has served in several information security and risk management roles including CISO for a Fortune 500 Financial Services organization. He has defined and implemented ISO standards-based Information Security programs, as well as led, developed, and delivered multiple Identity and Access Management Strategies and Roadmaps for several organizations. Craig is a contributor to IT publications and has presented at industry events including Burton Catalyst, Gartner and ISSA.
Read More: ClosingCorp Acquires WESTvm Ordering Technology
Cyber security professionals face the daunting task of securing a borderless perimeter against both external attacks and malicious insiders. In response to this new threat environment, the Zero Trust security framework has emerged to fill the void created by the disintegration of moat and castle architectures. In this webinar, Dr. Cunningham and Craig Cooper will discuss the role of monitoring behaviors, by both users and entities, in assessing risk which is central to the Zero Trust security model. They will present best practices illustrated with real-world use cases on how security analytics can be used to automate policy enforcement and controls to implement a Zero Trust architecture. Attendees will learn how to develop a blueprint for implementing Zero Trust security in their organization.
Read More: E Ink Announces Color Portfolio for Smart Retail, Education and Consumer Electronics
Comments are closed, but trackbacks and pingbacks are open.