Implementing Zero Trust Architecture: Strategies for Modern Cybersecurity in a Perimeterless World

#ZeroTrust #CyberSecurity #Azure
Share

Traditional perimeter-based security models can no longer adequately protect against today’s rising cyber threats and the challenges of hybrid workforces. Zero Trust Architecture (ZTA) presents a new approach by enforcing strict identity verification for every user and device attempting to access resources, regardless of their location.

This webinar will explore the principles and tenets of Zero Trust, review the various components of Zero Trust Architecture, and provide a real-world example of application deployment that showcases the key tenets of ZTA. The objective of this practical application is to demonstrate how different aspects of ZTA can be implemented from a practitioner’s perspective, securing both the inbound traffic to the organization’s network and protecting against insider threats. The demonstration will also cover Identity Management, Micro-segmentation, and workload isolation to enhance application security. This implementation offers actionable strategies for enterprises seeking to modernize their security posture. The discussion will conclude with an overview of the proposed ZTA maturity model and a roadmap for applying ZTA principles effectively.

Participants will be able to:

  •          Understand the tenets of Zero Trust and Zero Trust Architecture
  •          Take a practical approach to implementing Zero Trust in Azure
  •          Become familiar with the deployment of Zero Trust within the organization
  •          Explore strategies for creating a Zero Trust roadmap and discuss them using the Zero Trust maturity model

 



  Date and Time

  Location

  Hosts

  Registration



  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • Contact Event Host
  • Dr. Nihad Bassis
    Chair – IEEE Computer Society Orlando Chapter
    Email: nihad@ieee.org

    Rajesh Gundeti
    Secretary – IEEE Computer Society Orlando Chapter
    Email: rajesh.gundeti@ieee.org

  • Starts 21 August 2025 04:00 AM UTC
  • Ends 10 September 2025 04:00 AM UTC
  • No Admission Charge


  Speakers

Elyson

Topic:

Implementing Zero Trust Architecture: Strategies for Modern Cybersecurity in a Perimeterless World

Biography:

Title/Affiliation: Chief Information Security Officer at Imagine Believe Realize LLC, Rockledge, FL, USA

Biography: Dr. Elyson De La Cruz is a seasoned information technology and cybersecurity executive with over two decades of experience. He is currently the Chief Information Security Officer (CISO) at Imagine Believe Realize, a company specializing in software development for United States government agencies. He oversees technology and cybersecurity departments, focusing on training, mentorship, and leadership. As an academic and senior member of the Institute of Electrical and Electronics Engineers (IEEE), Professor De La Cruz presents at various international academic conferences and publishes his work with a special interest in cybersecurity, data analytics, AI/ML, IoT, and blockchain. Dr. De La Cruz holds a PhD in Information Technology, an MS in Management Information Systems, an MA in Computer Resources and Information Management, an MBA, and over 40 professional certifications in cybersecurity, information technology, and systems engineering

Chandra

Topic:

Implementing Zero Trust Architecture: Strategies for Modern Cybersecurity in a Perimeter less World

Biography:

Title/Affiliation: Lead Cloud Architect at Humana, Louisville, KY, USA

Biography: Chandra Prakash earned his Ph.D. in Information Technology at the University of the Cumberlands, Williamsburg, KY, in 2024. Chandra Prakash works as a Lead Architect for one of the Fortune 40 organizations, leading transformative initiatives that directly impact patient care and drive efficiencies across healthcare systems with a significant consumer reach. His ongoing efforts aim to address the complex challenges of data security, scalability, and automation in the healthcare sector.






Agenda

  •       Principles and Tenets of Zero Trust (ZT)
  •       Walkthrough of Zero Trust
  •       Demonstration of Zero Trust in Azure
  •       Strategies to Implement Zero Trust
  •       Maturity Model and Potential Roadmaps