Coffee Talk: Getting Started with Zero Trust

Date: Thursday, September 15 at 11am PT / 2pm ET

Join us live to qualify to receive a $5 Starbucks gift card!*

“We need to talk.” Those are difficult words to see in a text message or hear on voice mail. But we need to have a chat about “Zero Trust” and try and decern what it all means – for the security team, for your organization and ultimately for the business strategy. Like most things in cyber security the sudden realization that one small team trying to secure an organization of more than a 1000+ is futile. It needs a commitment from nearly every department, management and executive support. The reality is “Zero Trust” is a long journey with a destination which may never be completely arrived at. The story of Zero trust is born out of frustration with traditional IT approaches built on the insecurities of the Internet. Ian Thornton-Trump CD, CISO for Cyjax UK Ltd. has been presenting on Zero Trust for the last two years and will share his observations, frustrations and what he believes are the key ways your organization can move the ball forward. For some organizations with large technical debut and legacy equipment the journey may even be nearly impossible to start and require creative problem solving. This is an open Q & A format so bring the questions and we will find the answers.

Register now!

About the presenters:

Our Industry Expert

Ian Thornton-Trump, CISO, Cyjax

Ian Thornton-Trump, CISO, at Cyjax. Ian is an ITIL certified IT professional with 25 years of experience in IT security and information technology. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013. After a year with the RCMP as a Criminal Intelligence Analyst, Ian worked as a cyber-security analyst/consultant for multi-national insurance, banking and regional health care. Today, as Chief Information Security Officer forCyjax Ltd., Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cyber security consultant specializing in cyber threat intelligence programs for small, medium and enterprise organizations. In his spare time, he teaches cyber security and IT business courses for CompTIA as part of their global faculty and is the lead architect for CyberTitan, Canada's efforts to encourage the next generation of cyber professionals.

Moderated by:
John K. Waters, Editor at Large, Redmondmag.com


*Prize will be distributed to the first 250 attendees who attend the live event for a minimum of 51% of the total presentation. Only valid business e-mail addresses of current employer will be considered. Only eligible for one entry per individual, not per e-mail address. Must be a US resident. No substitutions allowed. False and/or deceptive entries or acts shall render entrants ineligible. No purchase is required. This offer is not valid where prohibited by law. If there is any reason to suspect abuse, fraud, or breach of these terms and conditions, we have the right to void the prize.


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.