<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">

Considerations for a Zero Trust Security Model


Zero trust has quickly become top of mind for many security specialists. In fact, according to Gartner, 80% of organizations are committed to implementing a zero-trust security model by 2022. However, a zero trust security model is not monolithic and requires more than any one solution provided by a single vendor. Centrify, Ping Identity, and Yubico come together to provide insights on how their joint solutions can help address this challenge.

In this virtual event you will learn:

-The considerations to begin a zero trust journey in your organization
-How Centrify, Ping Identity, and Yubico bring a complete, easy-to-scale security offering to organizations of all sizes 
-The benefits of partnering with a value added reseller like Fishtech Group

recorded THURS 4/8
watch on-demand


Your privacy is important to us and your information will be kept confidential.

Minimize Risk. Maximize Efficiency. Maintain Compliance. Exceed Business Objectives.

About the Hosts

Chuck Crawford - Moderator
Chief Customer Officer, Fishtech Group

Chuck brings 20-plus years of infrastructure and security experience and relevant leadership to Fishtech. His talent for aligning technology to organizational strategy is exceptional.

Previously as VP of Enterprise Architecture for Fishnet Security, he helped build and manage the cloud, data center, and virtualization practice. His team bridged the gap between security and next-generation computing environments. As CISO for the University of Kansas, he built the security program for the KU campus, including risk management, compliance, forensic analysis, governance, application, and network security. As KU’s Deputy CIO, he oversaw and managed the University’s cable plant, data centers, voice systems, network, and servers.

Chuck has led several teams building data centers in public, hybrid, and private cloud design, as well as in SDN-enabled research labs and environments.


David McNeely - Panelist
Chief Strategy Officer, Centrify

David McNeely is Chief Strategy Officer at Centrify, where he is focused on helping customers meet the evolving security needs of the modern enterprise, while contributing to the strategic vision of the company’s product portfolio. McNeely has been with Centrify for over 15 years, contributing to the company’s high growth via product innovation. Prior to joining Centrify, he served in a variety of product roles at AOL and Netscape Communications (acquired by AOL).


Loren Russon - Panelist
VP of Product Management, Ping Identity

Loren has managed product development and marketing activities for security and identity management product lines for 20+ years. Throughout his career, Loren has lived and worked in many different locations and started his career working in Asia in various product management and marketing rolls for a networking hardware and software company.


Karen Larson - Panelist
Director, Integrations Program, Yubico

Karen Larson is the Director for the Integrations Program at Yubico. Karen works with Yubico’s technology partners to enable secure implementations of the YubiKey, and to help partners understand all of the amazing things that YubiKeys can do. Karen’s interests include implementing secure, user friendly solutions that enable everyone to be safe and secure on-line.

Leading Organizations to a More Secure Future