Events Hub

The Zero Trust Interactive Forum 2021: The Panels

Written by Mon 14 Jun 2021

Techerati previews the Zero Trust Interactive Forum panel discussions.

The adoption and integration of Zero Trust principles into any cybersecurity strategy comes with many challenges and questions – what stand at the heart of the wide-ranging panel discussions taking place next week, 16th & 17th June.

The Zero Trust Interactive Forum, Cloud and Cyber Security Expo two-day virtual event, sees industry experts from Mastercard, William Hill, GSK, PWC, Nomad Foods and more weighing in on an abundance of hot topics, including securing business-critical legacy systems, closing the security gap in third-party connections, and how to take trust out of your corporate network with a new model for IAM.

If you’re attending and want to line up your arguments pre-show, read on to get an overview of the panels and what you can expect from them. Also, you can whet your appetite more with the rest of the conference agenda and all the insight the event has to offer!

Zero Trust, ZTA, and ZTNA: What do they actually all mean?
16th June, 09:55 – 10:35 am

With Zero Trust the new kid on the block and a security framework many are considering, it’s important to understand what it actually encompasses and what definition vendors go by. To add to the confusion, Zero Trust Architecture/Access and Zero Trust Network Access are terms also thrown into the mix. In this conversation, we’ll explore how to get started with Zero Trust, the key terms to get your head around and what questions to ask vendors with Zero Trust solutions.


  • Frank Satterwhite – Principal Cyber Security Consultant, 1600 Cyber GmbH
  • Fabrizio Di Carlo – Information Security Architect, Deutsche Börse
  • Steve Brown – Director, Cyber Security, Mastercard
  • Scott Storey – Lead Tutor, CAPSLOCK
  • Rajesh Ganesan – Vice President of Product Management, ManageEngine

Can Zero Trust and DevOps go hand-in-hand?
16th June, 11:05 – 11:45 am

With the increasing transition to distributed cloud architectures and microservices applications, it’s wise to consider how to achieve this with a Zero Trust environment in mind. For applications, it can be easier to build the security requirements into code, but taking a lift-and-shift approach might not be conducive to this security framework. Also, as the DevOps environment is so dynamic, how can a Zero Trust approach support this and avoid slowing down the pipeline? This panel discussion will consider how we can next level our DevSecOps strategy and facilitate rapid, yet secure, digital transformation.


  • Lera Leonteva – DevOps Security Architect, Manager, PwC
  • Wendy Ng – Cloud Security Architect Lead, OneWeb
  • Steve Bond – Group Head of Cyber Security, William Hill
  • Frank Morris – Managing Director, EMEA – Security Consulting, SIG, Synopsys

Securing business-critical legacy systems
16th June, 14:00 – 14:40 pm

When moving towards Zero Trust principles, legacy systems must not be forgotten. As patches and modernisation programmes can be more challenging to roll out or non-existent in some cases, legacy systems could house the flaws in your security. In this discussion, we’ll discuss how others are securing business-critical legacy systems using a Zero Trust framework. We’ll compare businesses at different stages and explore:
– The limitations of Zero Trust with legacy systems
– What to do when migration or modernisation isn’t an easy option
– How to avoid creating vulnerabilities during upgrades/implementing new security measures
– An outline of the key steps to secure these systems


  • Haroon Malik – Cyber Security Director
  • Joyce Rodriguez – Head of Cyber Threat Prevention, Shell
  • Rob Hornbuckle – Chief Information Security Officer, Allegiant
  • Steve Brown – Director, Cyber Security, Mastercard
  • Max Heinemeyer – Director of Threat Hunting, Darktrace

Closing the security gap in your third-party connections
16th June, 09:55 – 10:35 am

3rd party breaches are on the rise and for those with unvetted partners, they offer an attractive entry point for attackers wanting to steal your data. Cybersecurity teams need to prioritise identity to secure remote access and move away from the traditional approach where you’re unlikely to know the user or device accessing your network. In this conversation, we’ll explore:
– The current threat landscape with 3rd party data breaches
– Assessing the security of your third-party connections
– What to focus on when reviewing your vendor management process
– How to have secure partner connections from onboard to offboard


  • Sonya Moisset – Lead Security Engineer, Photobox
  • Frank Satterwhite – Principal Cyber Security Consultant, 1600 Cyber GmbH
  • Ahsan Qureshi – Ex-Cyber Security Lead, Financial Sector, PwC
  • Prathiba Shah – COO, SkyHive.io
  • Thom Langford – Security Advocate, SentinelOne

Avoid ‘zero trust’ in your new framework
16th June, 11:05 – 11:45 am

As you’ve most likely experienced, change management is often the biggest hurdle for IT teams. This perhaps couldn’t be more true when you’re asking employees and stakeholders to take an extra step to log in or restrict their access to parts of the network. From a cybersecurity perspective, Zero Trust seems like a robust way to go, but how will you embed this new way of working into the fabric of the organisation? This panel discussion will together touch on:
– Defining the ‘Why’ to the organisation
– How to leverage the CEO and senior executives
– How far can you achieve frictionless adoption
– Reflections on what could have been approached differently


  • Steve Furnell – Professor of Cyber Security, University of Nottingham
  • Jean Carlos – Group Head of Information Security, Nomad Foods
  • Dr. Andrew Aken – Cyber Security Evangelist, Twitter
  • Steve Turner – Principal Analyst, Forrester
  • Kapil Raina – VP Zero Trust & Identity, CrowdStrike

Take trust out of your corporate network with a new model for IAM
16th June, 14:00 – 14:40 pm

Implicit trust in a corporate network needs a rethink, especially with new cloud applications and an increasingly hybrid way of working. This is where Zero Trust comes in. One area that’s getting lots of attention is Zero Trust in identity & access management (IAM), which needs to balance end-user experience while not compromising your security posture. In this discussion, we’ll focus on how to reposition your IAM strategy in line with Zero Trust principles. We’ll also explore the technologies that support this strategy, facilitating seamless but secure access and using automation to reduce the manual load on cyber teams.


  • Jean Carlos – Group Head of Information Security, Nomad Foods
  • Martin Ingram – Product Owner, Identity and Access Management, Royal Bank of Scotland
  • Paul McKay – Principal Analyst, Forrester
  • Kamil Zacharski – Senior Director, IAM Engineering and Application Support, Royal Bank of Canada
  • Richard Archdeacon – Advisory CISO, EMEA Region, Duo Cisco

The Zero Trust Interactive Forum, Virtual takes place 16th & 17th June. For more information and to get your free ticket, click here.

Written by Renuka Jhalli

Written by Mon 14 Jun 2021


architecture hybrid cloud legacy systems zero trust
Send us a correction Send us a news tip