Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinar
Securing Your Network and Systems with a Zero Trust Architecture
Adopting a Zero Trust architecture is increasingly recognized as a critical strategy for securing networks and systems in the face of evolving cyber threats. This MegaCast hosted by ActualTech Media is tailored for IT professionals and managers aiming to implement or enhance Zero Trust frameworks within their organizations.
Securing Your Network in Every Direction with Zero Trust
Join this webinar to learn more about how Illumio and Netskope are partnering to provide you with the foundational elements you need to achieve your organization's Zero Trust goals. You'll hear how Illumio's Zero Trust Segmentation platform and Netskope's Zero Trust Network Access solutions seamlessly integrate to help organizations secure north-south and east-west traffic across your entire IT environment.
Securing Your Network and Systems with a Zero Trust Architecture
Adopting a Zero Trust architecture is increasingly recognized as a critical strategy for securing networks and systems in the face of evolving cyber threats. This MegaCast hosted by ActualTech Media is tailored for IT professionals and managers aiming to implement or enhance Zero Trust frameworks within their organizations.
Securing Your Network in Every Direction with Zero Trust
Join this webinar to learn more about how Illumio and Netskope are partnering to provide you with the foundational elements you need to achieve your organization's Zero Trust goals. You'll hear how Illumio's Zero Trust Segmentation platform and Netskope's Zero Trust Network Access solutions seamlessly integrate to help organizations secure north-south and east-west traffic across your entire IT environment.
Featured webinars
All webinars
The Long and Winding Road of a Young Hacker to Zero Trust
What does the Godfather of Zero Trust have in common with a reformed hacker? Both of their long, winding journeys through the cybersecurity industry led them to Illumio.
Join us for a brand new webinar featuring Chief Evangelist John Kindervag and Senior Systems Engineer Paul Dant where they sit down to discuss their careers, what brought them to Illumio, and the exciting future they both see in Zero Trust Segmentation.
Eliminating Network and Cloud Blind Spots With Illumio
Does a lack of full visibility of all application-dependencies, across you entire infrastructure, keep you awake at night? Illumio will discover and visualize all traffic between all applications, revealing any undesired traffic, compliance violations, or shadow-IT. Illuminate all of your application network behavior, and segment all applications directly at the workload, without dependency on traditional network appliances. Learn how Illumio changes Zero Trust from a good idea to a reality, simply and at scale.
There Will Be Lawyers: The Legal Costs of Breach Response
We all know that responding to cyber breaches can be very expensive. Still, many companies are unprepared for the avalanche of legal fees and other costs that also can follow. Simply put, when a breach occurs, there will be lawyers. However, many factors contribute to how much will need to be spent on lawyers. This new webinar, co-hosted by Illumio’s Head of Legal Aaron Margolis and Fenwick & West’s privacy and cybersecurity partner Michael Sussmann, and moderated by the Godfather of Zero Trust John Kindervag, will discuss the legal side of cyber breach response and break down how best to manage legal costs from these events.
No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity. In this exclusive live webinar, he will sit down with Illumio’s Raghu Nandakumara, Head of Industry Solutions, to discuss:
- His distinct perspective on cybersecurity, and his Zero Trust origin story
- Why he’s excited to be joining Team Illumio
- What the future holds for Zero Trust Segmentation
Illumio and Vanson Bourne: Why the Cloud Needs ZTS
Modern organizations rely on the cloud to run their critical systems and store their most valuable data. Despite this, it’s evident that today’s cloud security solutions are continuing to fail when it comes to safeguarding companies against breaches.
Segmentation for Public Cloud Applications to Contain Attacks
Cloud security is a top concern for organizations as they increasingly adopt cloud computing services to enhance their agility and scalability. Cloud service providers ensure the security of the cloud infrastructure itself, but organizations are responsible for securing their data and applications within the cloud. This division of responsibility can create confusion and gaps in security practices.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?