

Discover why, and how, to move from legacy security to an optimal Zero Trust model
In response to an evolving cyber threat landscape, organisations are moving from their legacy layered network defence to a Zero Trust security model. However, Zero Trust can’t be achieved with a simple technology solution: it can be a complex multi-year programme, and while 85% of organisations have already defined Zero Trust initiatives, they often don’t know where to start.
SentinelOne, in partnership with ITWeb, invites you to this practical session in which Milad Aslaner, Head of Technology Advisory Group at SentinelOne, will outline why - and how - to move to Zero Trust.
With Zero Trust, organisations follow the “never trust, always verify” approach, which dictates that endpoints, user identities, applications, and the corporate network are no longer trusted by default. In this presentation, you will learn about the paradigm shifts taking place in cyber defence, the differences between a legacy perimeter-based security model versus Zero Trust, and how you can successfully move to a Zero Trust security model.
Why should you attend?
Understand the core principles of a Zero Trust model
Learn how to create a Zero Trust network across people, processes and technology
Discover the challenges of Zero Trust and how to overcome these
Find out what questions you should ask your teams and vendors as you move toward Zero Trust maturity
Agenda
Why - and how - to move to a Zero Trust model
Milad Aslaner , Head of Technology Advisory Group, SentinelOne
Who should attend?
This event is for senior information security and risk executives, including:
CEOs
CIOs
CISOs
ICT Managers
Security Engineers, Architects and Directors
Risk Managers
Event Sponsor
About SentinelOne
SentinelOne is the only cybersecurity solution encompassing AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform. With SentinelOne, organizations can defeat every attack, at every stage of the threat lifecycle.
Learn more at: www.sentinelone.com