Zero Trust: Going Beyond the Why

The Zero Trust cyber security model is based on the principle of “never trust, always verify”. It’s a business strategy many organisations are looking at to adapt to the complexity of the modern work environment to protect their people, devices, apps, and data, without using traditional perimeter-based protection architectures.

Microsoft’s Zero Trust security models integrate security, compliance, identity management, and networking solutions into a tightly woven protective virtual mesh. Any access is explicitly verified, inspected for anomalies, and then monitored for risky or unusual behaviour patterns.

Our Microsoft Zero Trust webinar series explores how organisations can implement and leverage Zero Trust principles to strengthen and protect their entire digital estate. We are joined by experts and thought leaders to discuss key benefits and challenges with Zero Trust and current trends in the modern work environment that impact our security efforts.

Program1Image

Zero Trust Today: Industry Panel

On-Demand

Join us for an introduction into the world of Zero Trust and hear from our expert panel! Mark Anderson, Microsoft’s National Security Officer is joined by Mandana Javaheri, Head of Security Solutions, Microsoft Aisa, Grant Walters Cyber Security Lead, Wesfarmers, and Wenzel Huettner Chief Cyber Security Architect at Defend NZ.

View On-Demand
Program2Image

Zero Trust & Essential 8 – How to Boost Your Cyber Security

On-Demand

In this session, Bronwyn Mercer, Cyber Security Architect at Microsoft ANZ is joined by Jayden Cooke, Technical Director from the Australian Cyber Security Centre to discuss the Essential 8 principles plus recommendations from the ACSC.

View On-Demand
Program3Image

Why Identity is the New Security Perimeter

On-Demand

In this episode, we hear from Abbas Kudrati, APAC Chief Cyber Security Advisor at Microsoft, sit down with Saurabh Kumar, Group Security Manger of Authentication and Directory Services at NAB to discuss strategies to implement identity as a security perimeter

View On-Demand
Program4Image

Making Zero Trust a Business Strategy

On-Demand

In this session, Antoinette Jago, Security and Compliance Specialist at Microsoft ANZ, joins Charn Tangson, Head of Cyber Security & Privacy from Willow to discuss tips on how organisations can implement Zero Trust into their strategy.

View On-Demand
Program5Image

Zero Trust & Employee Experience

On-Demand

In our final episode, Denis O’Shea, Founder of Mobile Mentor joins Daniel Goffredo, Security Product Manager at Microsoft ANZ to discuss the importance of a great employee experience when adopting zero trust principles.

View On-Demand
Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image

Program1Image

Program2Image

Program3Image

Program4Image

Program5Image

Program6Image

Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image