BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250912T180918Z
UID:17850CD3-11D7-4DBF-B184-21CBD53CE545
DTSTART;TZID=America/New_York:20250910T193000
DTEND;TZID=America/New_York:20250910T201500
DESCRIPTION:Traditional perimeter-based security models can no longer adequ
 ately protect against today’s rising cyber threats and the challenges of
  hybrid workforces. Zero Trust Architecture (ZTA) presents a new approach 
 by enforcing strict identity verification for every user and device attemp
 ting to access resources\, regardless of their location.\n\nThis webinar w
 ill explore the principles and tenets of Zero Trust\, review the various c
 omponents of Zero Trust Architecture\, and provide a real-world example of
  application deployment that showcases the key tenets of ZTA. The objectiv
 e of this practical application is to demonstrate how different aspects of
  ZTA can be implemented from a practitioner’s perspective\, securing bot
 h the inbound traffic to the organization’s network and protecting again
 st insider threats. The demonstration will also cover Identity Management\
 , Micro-segmentation\, and workload isolation to enhance application secur
 ity. This implementation offers actionable strategies for enterprises seek
 ing to modernize their security posture. The discussion will conclude with
  an overview of the proposed ZTA maturity model and a roadmap for applying
  ZTA principles effectively.\n\nParticipants will be able to:\n\n- ○ Und
 erstand the tenets of Zero Trust and Zero Trust Architecture\n- ○ Take a
  practical approach to implementing Zero Trust in Azure\n- ○ Become fami
 liar with the deployment of Zero Trust within the organization\n- ○ Expl
 ore strategies for creating a Zero Trust roadmap and discuss them using th
 e Zero Trust maturity model\n\nSpeaker(s): Elyson\, Chandra\n\nAgenda: \n-
  ● Principles and Tenets of Zero Trust (ZT)\n- ● Walkthrough of Zero T
 rust\n- ● Demonstration of Zero Trust in Azure\n- ● Strategies to Impl
 ement Zero Trust\n- ● Maturity Model and Potential Roadmaps\n\nVirtual: 
 https://events.vtools.ieee.org/m/497587
LOCATION:Virtual: https://events.vtools.ieee.org/m/497587
ORGANIZER:rajesh.gundeti@ieee.org
SEQUENCE:7
SUMMARY:Implementing Zero Trust Architecture: Strategies for Modern Cyberse
 curity in a Perimeterless World
URL;VALUE=URI:https://events.vtools.ieee.org/m/497587
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Traditional perimeter-ba
 sed security models can no longer adequately protect against today&amp;rsquo\;
 s rising cyber threats and the challenges of hybrid workforces. Zero Trust
  Architecture (ZTA) presents a new approach by enforcing strict identity v
 erification for every user and device attempting to access resources\, reg
 ardless of their location.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;This webinar will exp
 lore the principles and tenets of Zero Trust\, review the various componen
 ts of Zero Trust Architecture\, and provide a real-world example of applic
 ation deployment that showcases the key tenets of ZTA. The objective of th
 is practical application is to demonstrate how different aspects of ZTA ca
 n be implemented from a practitioner&amp;rsquo\;s perspective\, securing both 
 the inbound traffic to the organization&amp;rsquo\;s network and protecting ag
 ainst insider threats. The demonstration will also cover Identity Manageme
 nt\, Micro-segmentation\, and workload isolation to enhance application se
 curity. This implementation offers actionable strategies for enterprises s
 eeking to modernize their security posture. The discussion will conclude w
 ith an overview of the proposed ZTA maturity model and a roadmap for apply
 ing ZTA principles effectively&lt;span style=&quot;font-size: 10.5pt\; line-height
 : 115%\; font-family: &#39;Arial&#39;\,sans-serif\; mso-fareast-font-family: Arial
 \; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;.&lt;br&gt;&lt;br&gt;&lt;
 /span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-ascii-theme
 -font: minor-latin\; mso-fareast-font-family: Arial\; mso-hansi-font-famil
 y: Aptos\; mso-hansi-theme-font: minor-latin\; mso-bidi-font-family: Arial
 \; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;Participan
 ts will be able to:&lt;/span&gt;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;text-in
 dent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]--&gt;&lt;span style=&quot;mso-ascii-font-fam
 ily: Aptos\; mso-ascii-theme-font: minor-latin\; mso-fareast-font-family: 
 Aptos\; mso-fareast-theme-font: minor-latin\; mso-hansi-font-family: Aptos
 \; mso-hansi-theme-font: minor-latin\; mso-bidi-font-family: Aptos\; mso-b
 idi-theme-font: minor-latin\; color: #1c1c1c\; background: white\; mso-hig
 hlight: white\;&quot;&gt;&lt;span style=&quot;mso-list: Ignore\;&quot;&gt;○&lt;span style=&quot;font: 7.
 0pt &#39;Times New Roman&#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;
 &amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;mso-ascii-font-fam
 ily: Aptos\; mso-ascii-theme-font: minor-latin\; mso-fareast-font-family: 
 Arial\; mso-hansi-font-family: Aptos\; mso-hansi-theme-font: minor-latin\;
  mso-bidi-font-family: Arial\; color: #1c1c1c\; background: white\; mso-hi
 ghlight: white\;&quot;&gt;Understand the tenets of Zero Trust and Zero Trust Archi
 tecture&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;
 &lt;!-- [if !supportLists]--&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-
 ascii-theme-font: minor-latin\; mso-fareast-font-family: Aptos\; mso-farea
 st-theme-font: minor-latin\; mso-hansi-font-family: Aptos\; mso-hansi-them
 e-font: minor-latin\; mso-bidi-font-family: Aptos\; mso-bidi-theme-font: m
 inor-latin\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;
 &lt;span style=&quot;mso-list: Ignore\;&quot;&gt;○&lt;span style=&quot;font: 7.0pt &#39;Times New Ro
 man&#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/
 span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-
 ascii-theme-font: minor-latin\; mso-fareast-font-family: Arial\; mso-hansi
 -font-family: Aptos\; mso-hansi-theme-font: minor-latin\; mso-bidi-font-fa
 mily: Arial\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;
 &gt;Take a practical approach to implementing Zero Trust in Azure &lt;/span&gt;&lt;/li
 &gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportL
 ists]--&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-ascii-theme-font: 
 minor-latin\; mso-fareast-font-family: Aptos\; mso-fareast-theme-font: min
 or-latin\; mso-hansi-font-family: Aptos\; mso-hansi-theme-font: minor-lati
 n\; mso-bidi-font-family: Aptos\; mso-bidi-theme-font: minor-latin\; color
 : #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;&lt;span style=&quot;mso-l
 ist: Ignore\;&quot;&gt;○&lt;span style=&quot;font: 7.0pt &#39;Times New Roman&#39;\;&quot;&gt;&amp;nbsp\;&amp;nb
 sp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[e
 ndif]--&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-ascii-theme-font: 
 minor-latin\; mso-fareast-font-family: Arial\; mso-hansi-font-family: Apto
 s\; mso-hansi-theme-font: minor-latin\; mso-bidi-font-family: Arial\; colo
 r: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;Become familiar w
 ith the deployment of Zero Trust within the organization &lt;/span&gt;&lt;/li&gt;\n&lt;li
  class=&quot;MsoNormal&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]-
 -&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-ascii-theme-font: minor-
 latin\; mso-fareast-font-family: Aptos\; mso-fareast-theme-font: minor-lat
 in\; mso-hansi-font-family: Aptos\; mso-hansi-theme-font: minor-latin\; ms
 o-bidi-font-family: Aptos\; mso-bidi-theme-font: minor-latin\; color: #1c1
 c1c\; background: white\; mso-highlight: white\;&quot;&gt;&lt;span style=&quot;mso-list: I
 gnore\;&quot;&gt;○&lt;span style=&quot;font: 7.0pt &#39;Times New Roman&#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;n
 bsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]-
 -&gt;&lt;span style=&quot;mso-ascii-font-family: Aptos\; mso-ascii-theme-font: minor-
 latin\; mso-fareast-font-family: Arial\; mso-hansi-font-family: Aptos\; ms
 o-hansi-theme-font: minor-latin\; mso-bidi-font-family: Arial\; color: #1c
 1c1c\; background: white\; mso-highlight: white\;&quot;&gt;Explore strategies for 
 creating a Zero Trust roadmap and discuss them using the Zero Trust maturi
 ty model&lt;/span&gt;&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: 
 10.5pt\; line-height: 115%\; font-family: &#39;Arial&#39;\,sans-serif\; mso-fareas
 t-font-family: Arial\; color: #1c1c1c\; background: white\; mso-highlight:
  white\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;ul&gt;\n&lt;li class=&quot;Mso
 Normal&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]--&gt;&lt;span sty
 le=&quot;font-size: 10.0pt\; line-height: 115%\; font-family: &#39;Noto Sans Symbol
 s&#39;\; mso-fareast-font-family: &#39;Noto Sans Symbols&#39;\; mso-bidi-font-family: 
 &#39;Noto Sans Symbols&#39;\; color: #1c1c1c\; background: white\; mso-highlight: 
 white\;&quot;&gt;&lt;span style=&quot;mso-list: Ignore\;&quot;&gt;●&lt;span style=&quot;font: 7.0pt &#39;Tim
 es New Roman&#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
 &lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Arial&#39;\,sans-serif\; mso-fareast-
 font-family: Arial\; color: #1c1c1c\; background: white\; mso-highlight: w
 hite\;&quot;&gt;Principles and Tenets of Zero Trust (ZT)&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;M
 soNormal&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]--&gt;&lt;span s
 tyle=&quot;font-size: 10.0pt\; line-height: 115%\; font-family: &#39;Noto Sans Symb
 ols&#39;\; mso-fareast-font-family: &#39;Noto Sans Symbols&#39;\; mso-bidi-font-family
 : &#39;Noto Sans Symbols&#39;\; color: #1c1c1c\; background: white\; mso-highlight
 : white\;&quot;&gt;&lt;span style=&quot;mso-list: Ignore\;&quot;&gt;●&lt;span style=&quot;font: 7.0pt &#39;T
 imes New Roman&#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/spa
 n&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Arial&#39;\,sans-serif\; mso-fareas
 t-font-family: Arial\; color: #1c1c1c\; background: white\; mso-highlight:
  white\;&quot;&gt;Walkthrough of Zero Trust &lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; st
 yle=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]--&gt;&lt;span style=&quot;font-s
 ize: 10.0pt\; line-height: 115%\; font-family: &#39;Noto Sans Symbols&#39;\; mso-f
 areast-font-family: &#39;Noto Sans Symbols&#39;\; mso-bidi-font-family: &#39;Noto Sans
  Symbols&#39;\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;&lt;
 span style=&quot;mso-list: Ignore\;&quot;&gt;●&lt;span style=&quot;font: 7.0pt &#39;Times New Rom
 an&#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif
 ]--&gt;&lt;span style=&quot;font-family: &#39;Arial&#39;\,sans-serif\; mso-fareast-font-famil
 y: Arial\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;De
 monstration of Zero Trust in Azure&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; styl
 e=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]--&gt;&lt;span style=&quot;font-siz
 e: 10.0pt\; line-height: 115%\; font-family: &#39;Noto Sans Symbols&#39;\; mso-far
 east-font-family: &#39;Noto Sans Symbols&#39;\; mso-bidi-font-family: &#39;Noto Sans S
 ymbols&#39;\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;&lt;sp
 an style=&quot;mso-list: Ignore\;&quot;&gt;●&lt;span style=&quot;font: 7.0pt &#39;Times New Roman
 &#39;\;&quot;&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]-
 -&gt;&lt;span style=&quot;font-family: &#39;Arial&#39;\,sans-serif\; mso-fareast-font-family:
  Arial\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;Stra
 tegies to Implement Zero Trust&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;t
 ext-indent: -0.25in\;&quot;&gt;&lt;!-- [if !supportLists]--&gt;&lt;span style=&quot;font-size: 1
 0.0pt\; line-height: 115%\; font-family: &#39;Noto Sans Symbols&#39;\; mso-fareast
 -font-family: &#39;Noto Sans Symbols&#39;\; mso-bidi-font-family: &#39;Noto Sans Symbo
 ls&#39;\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;&lt;span s
 tyle=&quot;mso-list: Ignore\;&quot;&gt;●&lt;span style=&quot;font: 7.0pt &#39;Times New Roman&#39;\;&quot;
 &gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;s
 pan style=&quot;font-family: &#39;Arial&#39;\,sans-serif\; mso-fareast-font-family: Ari
 al\; color: #1c1c1c\; background: white\; mso-highlight: white\;&quot;&gt;Maturity
  Model and Potential Roadmaps&lt;/span&gt;&lt;/li&gt;\n&lt;/ul&gt;
END:VEVENT
END:VCALENDAR

