SIGS Mentoring Program
ZERO TRUST

Join us on April 3rd, 2025 and earn 6 CPEs

(registration will be closed April 2nd, 2025 - seats limited to 40)

Christer Swartz on behalf of SIGS

Christer Swartz is Director Industry Solutions for Illumio but at this day in charge for SIGS. He is coming from San Jose, California and we know him since many years.

He has spent many years in the Networking industry, beginning with a small startup called Cisco. He has worked for Swisscom and Nokia as an architect for their Service Provider backbones, and he has worked on Cloud architectures for many years, including working for Netflix on the design of their Internet video-streaming architecture, and for Palo Alto Networks, designing security for Hybrid Cloud fabrics.

He has focused for many years on Security, which has long been an afterthought, or a nuisance, in Networking and Cloud architectures.
HOST SPONSOR

LOCATION
Sunrise GmbH
"Stage" on the ground floor
Thurgauerstr. 101b
8152 Glattpark (Opfikon)

Paid parking spaces available in the underground garage

Date & Time
April 3rd, 2025
10:00 am - 5:00 pm followed by an Apéro

Participation Fee
EUR 110.-- which incl. lunch and apéro at the end (just to cover the expenses)

SIGS Mentoring Program - Zero Trust Workshop (1 day)

10:00 am -
10:30 AM
Welcome presentation from the host sponsor Christian Etter, Senior Specialized Sales Security at Sunrise Business

Silvia Mikic, Head of Project Management at Sunrise Business

Early experiences with Zero Trust Network Access Implementation
(details will follow)
10:30 am -
5:00 pm
SIGS Mentoring Program
Zero Trust Workshop (1 day)

1. Overview of exactly how malware spreads between workloads. Not focusing specifically on the intention of malware, but rather on the limited number of methods all threats rely on to move. And focusing on the technical details involved in this movement, with specific malware examples.

2. Overview of specific methods used to limit the ability of malware to move, with the focus being on the technical details on how to do so, rather than focusing on specific cybersecurity vendors.

3. Session on technical options for visibility, across all network fabrics, not just on Data Center or Cloud or Endpoints, but how to see as big of a picture as possible without becoming overly-complex.

4. Hands-on session on how to see what’s going on across all environments, using Illumio’s tools as an example .

5. Hands-on session on integrating multiple vendor tools together, for a holistic approach to preveting the spread of malware.

Despite spending dramatically more money every year to try to reduce cybersecurity incidents, they only keep increasing. They never decrease. Zero Trust is an idea in which all resources are their own local trust-boundary, whether they are hosted in Cloud, in Data Centers, or on Endpoints. All of these resources have a default-deny Policy model created, with exceptions enabled only as required. But despite many people applying this security model, cybersecurity incidents keep happening anyway.

Broadly speaking, there are 2 places on which Zero Trust can be applied: on the workloads themselves, or on the segments between the workloads. Most current Zero Trust solutions follow the first approach, trying to protect the resources from threats. This is important, but by the time an infected resource has been scrubbed of a threat, that threat will have spread to all other resources, and you now have a bigger problem. Zero Trust needs to focus on the common dependencies which all threats rely on to spread, in order to prevent a small problem from escalating into a big problem .

Zero Trust needs to begin with enforcing the segment, as the foundation of the Zero Trust architecture. All threats rely on segments to move, both the threats of today and the much-feared AI-generated threats of tomorrow. Since we know that all threats share one thing in common - relying on the segment - Zero Trust needs to monitor all activity on all segments.

This task of monitoring the segment involves several details, and this workshop will go over these details, demonstrating specific practical examples of how to implement the theory of Zero Trust. This won’t be simply slideware, but will be hands-on access to using Zero Trust Segmentation tools to discover, monitor, and take action on a segment for a variety of threats, over a variety of resources.
 
Contact Us
If you have any questions or you like to get information about further SIGS Events, please do not hesitate to contact us!
 Join us on April 3rd!
We look forward to hosting you!

Processing Registration...