TechNet Cyber Sponsorship Opportunities


Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the marketing and sponsorship opportunities available at TechNet Cyber 2020 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.

Have an idea for a sponsorship you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!

The Missing Link in ZERO TRUST at the Endpoint, Especially for Teleworking

    Monday, November 30, 2020: 3:00 PM - 4:00 PM

    Speaker(s)

    Speaker (confirmed)
    Robert "Bob" Bauman
    President & Chief Executive Officer
    Trusted Systems, Inc.

    Description

    There exists a missing link in classified network physical security specifically dealing with the endpoint embracing the connection from the wall to the desktop and the network user interface.  This gap in protection has been virtually ignored, enabling catastrophic breaches in security from insider threats, most notably, Bradley (Chelsea) Manning and Edward Snowden.

    This session focuses on the nature of the insider threat as it relates to the network endpoint.  The discussion covers shortcomings of existing policies and how archaic countermeasures have not kept pace with technology and emerging threats.  A new cohesive strategy for network security integrated with cybersecurity from the user to the cloud needs to be advanced to fill this endpoint missing link.  Attention must be based on the network user interface and exposure of network equipment to compromise even though the room is secured.  This aspect will be discussed in depth with potential solutions proposed for review.  As a case in point, recent events are focusing attention on remote teleworking and ZERO TRUST architecture.    

    The ongoing pandemic lockdown has created an urgent need to enable classified connectivity from homes. In the haste to respond to this urgency the need to provide infrastructure protection at home equivalent to that required at the office has been sidestepped or overlooked. The Cybersecurity Community has emphasized a ZERO TRUST architecture applied to cloud-based data to fill the void. That’s “trust but verify explicitly” from the inside out. The same principles must apply equally from the outside in, from the desktop that is user based. Currently, VDI based solutions applied thus far render trust to the user, but without the verify. That is the missing link.
      
    Fortunately, there are safe-based solutions tailored to in-home use. Compact, autonomous, self-controlled, inconspicuous. When coupled with desktop biometrics and remote monitoring and control, a seamless, convenient, compliant package results that puts the “verify” into teleworking equal to, if not better than, that mandated at the office.


    Tracks:


    Approved for: 1 CompTIA CEU for: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, and CASP+; 1 GIAC CPE