New Cryptographic Techniques for Implementing the Zero Trust Model
The Zero Trust model is gaining support across the security industry in response to the ever changing threat landscape and the realization that owned infrastructure, from data centers to branch offices, and from LANs to private WANs, is neither controlled nor secure. The vast majority of data breaches now occur as a result of user compromised credentials providing a hacker with direct access to trusted networks. Learn a new mindset and how to implement a cyber security strategy that conforms to the Zero Trust Model over any network architecture. You will also gain insight into Certes Networks unique and patented Layer 4 encryption technology and see a demo of the Crypto Flow Network Creator group key management platform.
Speaker: Dan Garbarz
Dan Garbarz is the Director of Systems Engineering for Certes Networks. A certified ethical hacker and active ISSA member, Dan has spoken on a variety of Information Technology related topics throughout his career and holds both a degree in Computer Science and a Masters in Business Administration.
You may reserve your spot by registering via the Constant Contact link in the email we send out or the Register button on this page before 9:00am the day of the meeting. We encourage you to register online even if you plan on paying at the door so that we will have a count for the restaurant.
Please note you are free to show up without registering and we will certainly try to seat you, but it is always possible we may need to turn unregistered persons away when seats run out – so please register.
Members who prepay online: $10
Guests who prepay online: $25
Anyone paying at the door: $30
Come back following the meeting for access to the video, presentation file, and photos from this event.
Note: Photos and audio/video recording occur at our events and you will be required to agree to a release during registration.