[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”s” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_1 width=”1/1″ last=”true” title=”” title_type=”” animation=”none” implicit=”true”]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#af0303″ background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”10″]
[/blank]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[column_2 width=”1/4″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[/column_1]
[blank h=”30″]
[/blank]
[/column]
[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”30″]
[/blank]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/2″]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[push h=10]
ABOUT THE PROGRAM
Zero Trust – The Future of Enterprise Security is an exclusive two-hour event featuring an expert panel and an open room discussion in a private room at a 4 star restaurant. Our invitation-only group of 30 CISOs and security leaders will convene with three simple goals in mind:
[push h=10]
[push h=10]
PHOTOS FROM THIS EVENT
[push h=10]
This event will feature an industry panel who will discuss lessons learned, experiences and recommendations in an informal fashion without recordings, press, or social media hampering our exchange of knowledge. Please see below for featured photos from this event:
[push h=10]
[/column_2]
[column_2 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_3 width=”1/1″ last=”true” title=”” title_type=”single” implicit=”true”]
[portfolio layout=”scrollable” nopaging=”false” column=”4″ max=”100″ title=”false” desc=”false” more=”” group=”true” cat=”032118-centrify-seattle” ids=”30795,30796,30799,30801,30803,30807″]
[/portfolio]
[/column_3]
[/column_2]
[blank h=”30″]
[/blank]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#ededed” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/2″ last=”true”]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[push h=10]
ABOUT THE CONTENT
Today’s sprawling workforce, mobile devices, and growing reliance on cloud infrastructure and applications play a critical role in why companies are moving away from a traditional, perimeter-based security approach. Instead it’s being replaced by a “Zero Trust” model with identity at its core. Zero Trust Security reduces the risk of breaches and enables business agility by dynamically securing access to enterprise resources through knowing the user, knowing their device, giving just enough access, while continuously learning and adapting without hampering access to the tools and information that workers need to get their jobs done.
[push h=10]
We’ll examine:
[push h=10]
[/column_2]
[/column_1]
[/column]
[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#f8f8f8″ background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”25″]
[/blank]
[column_2 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/4″]
[column_3 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
MODERATOR
[push h=10]
[/column_3]
[column_3 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
Bill Mann
Chief Product Officer
Centrify Corporation
[push h=10]
[push h=10]
[/column_3]
[/column_2]
[column_2 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”” class=”” id=”” title=”” title_type=”single” animation=”none” width=”3/4″ last=”true”]
[column_3 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
PANELISTS
[push h=10]
[/column_3]
[column_3 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]
Bruce Lobree
Cyber Security Architect
Symetra Financial
[push h=10]
[push h=10]
[/column_3]
[column_3 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]
Tracey Pretorius
Director, Cybersecurity & Cloud Strategy, Issues Management
Microsoft
[push h=10]
[push h=10]
[/column_3]
[column_3 width=”1/3″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
Sudharma Thikkavarapu
Head of Data & Application Security
T-Mobile
[push h=10]
[push h=10]
[/column_3]
[/column_2]
[blank h=”10″]
[/blank]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#af0303″ background_image=”https://bdionline.com/wp-content/uploads/2017/06/RSVP-Opaque-Light.png” background_repeat=”no-repeat” background_position=”center center” background_size=”auto” background_attachment=”fixed” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”30″]
[/blank]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
If you have received an invitation and would like to RSVP, or if you would like additional information and to be considered for participation, please email Stephanie Pereira Lima at stephanie.p.lima@bdionline.com. While there is no cost to participate, we require registrants to show up and actively contribute to the conversation.
[push h=20]
[/column_2]
[column_2 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]
DATE
Wednesday, March 21, 2018
[push h=10]
TIME
12:00 pm – 2:00 pm
[push h=10]
LOCATION
Seven Beef
1305 E Jefferson St., Seattle, WA 98122
[/column_2]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
ATTENDEE PROFILE
30 CISOs and security leaders
[button id=”” style=”border” class=”” align=”left” link=”mailto:stephanie.p.lima@bdionline.com?subject=RSVP%20for%20the%2003%2F21%20Security%20Event%20in%20Seattle” linkTarget=”_self” bgColor=”accent7″ hover_color=”accent5″ font=”20″ icon=”” icon_placement=”left” icon_color=””]RSVP NOW[/button]
[/column_2]
[column_2 width=”2/5″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
EVENT AGENDA:
12:00 PM – 12:30 PM | Registration and Networking Lunch |
12:30 PM – 1:15 PM | Panel Discussion |
1:15 PM – 2:00 PM | Moderated Open Room Discussion Groups |
[/column_2]
[blank h=”15″]
[/blank]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”75″]
[/blank]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company’s Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure. Centrify enables over 5,000 worldwide organizations, including over half the Fortune 50, to proactively secure their businesses from the inside out. |
[push h=45]
Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch. |
[/column_2]
[/column_1]
[/column]