$400 Amazon Gift Card with OnDemand Training through March 10 - Learn More!


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

Building a Zero Trust Model in the Cloud with Microsegmentation

  • Tuesday, April 02, 2019 at 1:00 PM EDT (2019-04-02 17:00:00 UTC)
  • John Kindervag, Salvatore Sinno


  • Unisys

You can now attend the webcast using your mobile device!



The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter of a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous. The assumption that systems and traffic within a data centre can be trusted is flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming. These same principles are equally applicable to public cloud deployments.

The Zero Trust architecture is the foundation of the future of public cloud security. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that organizations can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.

In this webcast, John Kindervag, the creator of the Zero Trust Model, and Unisys experts will introduce concepts associated with the Zero Trust model in the cloud and show how Unisys Stealth® and Palo Alto Networks provide a unified platform to enhance system survivability and reduce the impact of potential threats.

By the end of this session, attendees will

1.   Understand how Palo Alto Networks and Stealth enable the Zero Trust model within the cloud.

2.   Understand Palo Alto Networks and Stealth Zero Trust segmentation platform.

3.   Understand how this solution can accelerate cloud adoption.

4.   Understand methods and metrics by which the next generation of CISO's can define and deliver success in the public cloud.

Speaker Bios

John Kindervag

John Kindervag joined Palo Alto Networks as Field CTO in 2017 after eight and one half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.

Zero Trust is widely embraced by companies as diverse as Coca Cola, Google, and WestJet Airlines. Notably, the US House of Representatives is recommending that all government agencies adopt Zero Trust in the wake of the OPM Data Breach: https://oversight.house.gov/wp-content/uploads/2016/09/The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf. Additionally, Chairman Jason Chaffettz wrote a bylined article in Federal News Radio endorsing Zero Trust: http://federalnewsradio.com/commentary/2016/09/adopting-zero-trust-cyber-model-government/. These recommendations have led to increasing adoption of Zero Trust within the United States Federal Government.

He currently advises both public and private sector organizations with the design and building of Zero Trust Networks and other Cybersecurity topics. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH, and CCNA. John has a practitioner background, having served as a security consultant, penetration tester, and security architect. He has particular expertise in the areas of secure network design, wireless security, and voice-over-IP hacking. He has been interviewed and published in numerous publications, including The Wall Street Journal, Forbes, and The New York Times. He has also appeared on television networks such as CNBC, Fox News, PBS, and Bloomberg discussion information security topics. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec Europe, and InfoSec World. John has a Bachelor of Arts degree in communications from the University of Iowa and lives in Dallas, TX.

Salvatore Sinno

Salvatore has held Chief security architect roles in the security industry, in the private sector and UK public sector. He has a rich history of providing robust and stable enterprise security architectures around the world. Salvatore is a recognized expert in advanced security technology including micro-segmentation, allowing him to create solutions that lower costs and risks together while leveraging advanced infrastructures of clouds and mobile. 

A regular speaker at security events and author of articles and whitepaper, Salvatore is a highly regarded industry expert in all aspects of cybersecurity, and an early evangelist of zero trust security architecture model. As a global thought leader, Salvatore has created solutions defending many of the world's enterprises by leading both the advanced technical teams necessary to stop threats and the strategic board/executive advisory services necessary to prevent them. Salvatore holds the designations of Certified Cyber Forensics Professional (CCFP), ISACA Certified Information Security Manager (CISM), CESG Certified Lead Security Architect and is a Certified Information System Security Professional (CISSP).

Salvatore lives in the United Kingdom, where he received his Master of Science degree in information technology as well as an MBA.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.