Request a Demo


Zero Trust: Redefine Your Application Security Model

Recorded on August 27, 2020

Legacy IT focuses on protecting the perimeter of your applications from outside attackers, but wrongly assumes any user or device inside your network is safe. Zero trust enforcement is a response to the breakdown of this traditional security model and the rise of remote workforces.

By assuming attackers exist both within and outside of your network, the zero trust security model dictates that no users or machines should be trusted by default.

Dr. Ed Amoroso, former CSO at AT&T, will share practical guidance for enforcing zero trust policies. Security and operations teams will learn core zero trust principles: continuous authentication, microsegmentation, and real-time app & API monitoring. We’ll demonstrate how modern security tools can provide effective defense and positive user experience.

Watch the webinar recording to protect your applications through the zero trust framework!

About the presenters

Dr. Ed Amoroso

CEO, Tag Cyber; Former CSO, AT&T

Dr. Edward G. Amoroso is the founder of TAG Cyber, a global security research company. Ed retired from AT&T after 31 years as CSO. Ed is a Research Professor at the Tandon School of Engineering at New York University. He earned a BS degree from Dickinson College, MS/Ph.D. degrees from the Stevens Institute of Technology, and an MBA degree at Columbia Business School. Ed holds 10 patents in the area of security technology and his work has been featured in the New York Times, CNN, and the Wall Street Journal.

Brendon Macaraeg

Sr. Director of Product Marketing, Signal Sciences

Brendon Macaraeg leads product marketing for Signal Sciences which protects the web presence of the world’s leading brands. Prior, Brendon led product marketing for the incident response and professional services division of CrowdStrike. He also led product marketing efforts for both the Norton consumer security products and Symantec's enterprise mobility and endpoint management.