December 2022: Zero Trust - Never Trust, Always Verify
Thank you for joining us as local cyber security leaders discussed their experience evolving towards zero trust. Which technology and best practice areas are you working on in 2023?
Identity and Access Management
Thank you to our moderator and panelists:
VP Information Security & Technology Risk Management
Bob has over 30 years of Information Technology experience and has been leading cybersecurity for almost a decade. He leads the Information Security division for WWE. His responsibilities include Cybersecurity Operations and Threat Intelligence, Cybersecurity Engineering, Information Security and Governance, Data Privacy and Compliance, and Technology Risk Management. He is focused on continuing to mature the organizations cybersecurity posture.
Head of Identity and Access Management & Security Engineering
Jackie has over 17 years of experience in IT and Identity and Access Management. In her current role as the Head of Security Engineering and Identity and Access Management at MassMutual Jackie leads the Security Engineering teams that support Endpoint, Network Security and Security Platforms. She is also responsible for the Identity and Access management teams and overall strategy and implementation of innovative IAM solutions that use data science to predict user behavior. Prior to joining MassMutual Jackie worked at Barings (Formally known as Babson Capital) leading the Desktop Support, Collaborative Platforms and Identity and Access Management teams.
Chief Cybersecurity Architect
Jim is the Chief Cybersecurity Architect at Travelers. Jim has over 35 years of experience in IT, and 26 years of direct experience in information security. Jim has been focused on cloud security for the past 5 years supporting Travelers application and infrastructure modernization efforts. Travelers has a complex path to zero trust, which is being guided by Jim and he is looking forward to sharing insights and learning what others are doing as well.
Dan has 21 years of experience in the areas of Cloud and Cloud Infrastructure Security, Security Architecture, IT Security Technology Portfolio Management, Integrated Operational Risk Management, Information Security Regulatory Compliance, Identity Management, IT Effectiveness, IT Risk Management, and Business Risk Services.
Thank you to our sponsors: