Blog News & Announcements What You Missed at Aiming for Zero
Apr 30 2021

What You Missed at Aiming for Zero

In case you missed it, Netskope’s recent Aiming for Zero event was focused around how Zero Trust is more than just access controls and passwords—it’s a security concept that applies to all aspects of your network, your data, the applications you use, and the way you interact with them.

If you missed the event and want to hear more about our deep dives int Zero Trust, there’s no need to worry! Our sessions included the following:

Zero Trust and Data Protection: First Principles For A New Normal

In this presentation, Netskope CMO & CSO Jason Clark was joined by David Holmes, Forrester Senior Analyst, and Dustin WIlcox, VP & CISO for Anthem, to discuss Zero Trust and Data Protection. In their discussion they:

  • Cut through the buzzwords to break down the concept of Zero Trust and how it best applies to organizations.
  • Shared their experiences helping enterprises understand the key use cases where a Zero Trust strategy is paramount to their security strategy going forward.
  • Check out the full session recording here!

The Trust Continuum: The Journey To Zero Trust

This panel discussion between technology and cybersecurity leaders was led by Netskope VP James Christiansen and covered:

  • How security teams can strike the right balance of data access and security by applying Zero Trust principles.
  • How applying Zero Trust security concepts can lead to positive long-term outcomes for organizations.
  • Check out the full session recording here!

Zero Trust in Your Ecosystem: Securing Access, Devices and Data

This session was a panel discussion with security experts from Netskope, Crowdstrike, and Okta talking about the specifics of applying Zero Trust principles in your security ecosystem. In this discussion they covered:

  • How Zero Trust principles can be applied across strong identity and access management, next generation endpoint security, and SASE-delivered cloud security.
  • How Netskope, Crowdstrike, and Okta together can ensure continuous controls can be activated and integrated across user identity, devices, applications, and data for a stronger overall security posture.
  • Check out the full session recording here! 

Zero Trust Data Protection in Action!

This session was a walkthrough of Zero Trust Data Protection (ZTDP), a new Netskope approach for protecting data that applies zero trust principles to accessing cloud data outside of one’s organizational network. Specifically this walkthrough detailed real-world scenarios with a real-time Netskope client deployment to show off the power of ZTDP in action.

author image
About the author
Max Havey is a Content Specialist for Netskope's corporate communications team. He is a graduate from the University of Missouri's School of Journalism with both Bachelor's and Master's in Magazine Journalism. Max has worked as a content writer for startups in the software and life insurance industries, as well as edited ghostwriting from across multiple industries.
Max Havey is a Content Specialist for Netskope's corporate communications team. He is a graduate from the University of Missouri's School of Journalism with both Bachelor's and Master's in Magazine Journalism. Max has worked as a content writer for startups in the software and life insurance industries, as well as…