Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinar
Featured webinars
All webinars
Achieving Success: A Practical Guide to Executing Zero Trust
In this session we will show how to plan your deployment to ensure success and how automation can help achieve success at scale.
Zero Trust Is Not No Trust
In this session we will explore a Zero Trust approach to security and what can often make it seem an obtainable objective, before focussing on strategies that can make it digestible and achievable, and ultimately lead to a constant measurable improvement in an organisation's cyber risk exposure.
Zero Trust in Healthcare: The Cyber Immune System Booster
Zero Trust is a concept and an outcome born from examining your organization’s gaps in security and risk posture and identifying where to apply controls that enforce least privilege and the greatest levels of visibility and segregation.
As a security leader in healthcare, I examined Zero Trust through the lens of how we’ve managed the COVID19 pandemic and identified parallels between Zero Trust and modern disease management. We take medication, wear masks and wash our hands, and use other controls like vaccines to prevent the spread of a virus.
That is actually a common use case of Zero Trust security – designing controls to prevent an unauthorized asset/resource & minimizing impact from an intruder or infection by preventing lateral movement. Humanity will always be battling disease, just like organizations will always have threat actors and adversaries attempting to breach controls. In this presentation, we’ll use concepts from disease management to explain Zero Trust security, and the practical business outcomes, security improvements and metrics you need to boost your own organization’s cyber immune system.
The Building Blocks: How Zero Trust Meets Illumio
In this session, learn how Illumio Core was built from the ground up with the central tenet of a default-deny policy model including:
- How visibility and Application Dependency Mapping allow for a Zero-Trust network policy to be built
- Host-based segmentation - and the inherent Zero Trust Advantages
- Illumio Policy and it's Zero Trust implications
- Selective Enforcement/Boundaries - and how they can be used to more easily achieve Zero Trust
Zero Trust for the Endpoint: Control the Conversation
With remote work, the home office has effectively become a local, unmonitored extension of the corporate network – with more risk and less visibility or control.
In this webinar, see how Zero Trust for the endpoint with Illumio Edge helps IT quickly parse activity and contain ransomware by default, with Illumio Director of Product Marketing Katey Wood and Director of IT Matt Parsons.
Watch to learn how to:
• Quickly deploy Zero Trust endpoint segmentation that protects even against zero-day threats.
• Gain real-time visibility and create policies to stop unauthorized traffic.
• Prevent the spread of ransomware on endpoints – on or off the network.
Securing Remote Endpoints in a Hybrid Workforce
Watch now as we review Illumio’s Security Risks 2021 endpoint security survey report on how businesses are protecting employee endpoints, on or off the corporate network. You’ll also be able to listen to us cover other key topics including…
• What security visibility and control does IT have into endpoints on ungoverned home networks?
• Considerations for preventing the spread of ransomware like Ryuk, and even Zero Day threats, into mass infections
• Where Zero Trust security fits in a hybrid model as employees – and their endpoints – start returning to the campus network
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?