iSECURE_Adopting Zero Trust_2022APR07
iSECURE_IBM iSECURE Logos for Zoom_2022APR27

Speaker: Chip Crane, IBM Principal Security Technical Specialist Manager

When: Wednesday, April 27th, 2022

Where: Virtually

Are you struggling with how to practically implement Zero Trust and budget for it?

Please join us Thursday, April 27th for a Zero Trust Webinar as iSECURE welcomes back Chip Crane, IBM Principal Security Technical Specialist Manager, to discuss a practical approach to Zero Trust. 

In this webinar, you will walk away with unique ways to:

  • Practically Implement Zero Trust
  • Discuss Zero Trust with your Board of Directors & Executives
  • Budget for Zero Trust


Session 1: 10:00 a.m.

Session 2: 2:00 p.m.



Organizations are implementing a Zero Trust model, and need to focus on strict controls by identifying users while integrating a strong authentication process and policy.

The Zero Trust model requires a strong foundation to protect users and data. iSECURE has compiled a list of key components to begin adopting a Zero Trust architecture:

  • Week 1:
    User Access Control
    Two Factor Authentication 
  • Week 2:
    Device Management 
  • Week 3:
    Third-party Risk

Our three-part series will introduce these four key components of the Zero Trust model.

User Access Control: Does your organization know what users have access to sensitive data in your network?

  • Why it matters: Zero Trust includes user access controls and policies, and sets the parameters for exactly what type of access users have. A user who shouldn't be looking at sensitive data can easily gain access because these controls are not in place.

Two-factor Authentication: Does your organization authorize all of your users entering the network?

  • Why it matters: Having a multi-step process to providing or showing that who you are is true is an added layer of protection for your network. When used, two-factor authentication only grants access to users who have been effectively validated and who need access.


Stay tuned for week two as we discuss endpoint and device management!