Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinar
Featured webinars
All webinars
Trusting Zero Trust
During the past two years, organizations have transformed how they run their digital enterprise for their employees, customers, and partners.
This transformation has forced a radical re-think in how computing resources and data can be adequately secured. Adopting a Zero Trust model has been at the forefront of this rising priority.
This webinar provides key survey findings from the Illumio-commissioned study conducted by Forrester Consulting. In this new study, “Trusting Zero Trust,” Forrester investigates how organizations are adopting Zero Trust segmentation to safeguard their digital enterprises.
In this webinar, you will learn:
• How organization are adopting Zero Trust security
• The benefits that have been realized from Zero Trust security
• The challenges to implementing Zero Trust security
• Key lessons and takeaways
Zero Trust in Practice: Lessons from Security Expert: Jamie Rossato
Join this 45-minute webinar where Nathanael Iverson, Chief Evangelist at Illumio will speak with Jamie Rossato, Information Security Director at Lion about their journey to Zero Trust security.
Watch to learn:
. The security challenges facing Lion and other organizations today who depend on OT networks for operations and IT connectivity for efficiency and innovation.
. The steps Jamie took to introduce Zero Trust into the enterprise to protect Lion’s business-critical assets from ransomware and other cyberthreats.
. The benefits of vulnerability mapping and micro-segmentation for making Zero Trust practical and manageable.
. How to design Zero Trust policies to thwart attackers while keeping OT-powered business operations running smoothly.
. Tips for other IT security leaders: Jamie’s recommendations for overcoming challenges in the areas of governance, company culture, and technology.
How to Identify and Contain Ransomware Fast
Ransomware is the threat that keeps on giving. Years after it progressed to being the top security concern that most organizations have, ransomware remains a growing problem.
But, did you know most ransomware attacks follow a similar pattern and can be contained with a few simple actions? Join Illumio’s Chief Evangelist, Nathanael Iversen to learn the best practices for how you can protect your organization against ransomware.
In this webinar you will learn…
• How you can understand your risk in context through a vulnerability assessment.
• The five steps you can take to stop ransomware fast.
• How you can combine these steps to create an achievable Zero Trust journey.
The Zero Trust Cure for Ransomware Threats
If you’re concerned about the severe threat from ransomware, be sure to join Illumio’s Trevor Dearing as he speaks with featured speaker, Allie Mellen from Forrester. This information-packed webinar will provide valuable information about how Zero Trust segmentation drastically reduces attack damage and cuts the time to remediation.
Register today and join our webinar where we will cover these important topics:
• How visibility provides the knowledge you need to identify risk.
• Closing high-risk ports to provide a simple block.
• Using application ring fencing to stop future unknown attacks.
Ransomware Happens. We stop it from spreading.
presentation and demo
Lighting a Path to Zero Trust: 6 Steps to Implementing a Zero Trust Model
Despite acknowledging its security benefits, many organizations hesitate to implement a Zero Trust model. An "all or nothing" approach to Zero Trust is a tall and unsustainable task. What if you took a more incremental, agile approach that allows your organization to make realistic steps toward achieving Zero Trust? Join Illumio as we will discuss..
• Why taking a waterfall approach to rolling out Zero Trust is fraught with risk of failure
• How adopting an agile mindset significantly improves the chances of success of achieving the Zero Trust security goals
• The six steps to pragmatically build your Zero Trust security program using a repeatable process
• How security controls like segmentation can help tackle focus areas such as workload protection
• A demonstration of each of the six steps in action in the context of segmentation – see how an application is taken through the full cycle
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?