Zero Trust as a top-down approach

Webinar  | January 25, 10 AM CET  |  45 minutes

Sign up

US President Joe Biden’s Executive order to start implementing Zero Trust is leading to worldwide emulation by, amongst others, the English National Cybersecurity Center (NCSC) and the Dutch NCSC, through the recently published Factsheet.

As Zero Trust Innovator ON2IT has been contributing to this work for years and ON2IT Global CISO Prof. Yuri Bobbert and Lead Architect Rob Maas are happy to update you on the following issues:

  • How can I interpret and operationalize the NCSC Factsheet?

  • How do I translate a Zero Trust Strategy to Operational activities?

  • How do I combine Zero Trust with existing frameworks such as BIO, NEN, ISO or NIST?

  • Which principles and steps guide the national NSCSs?

  • How do I adequately maintain overview and control over the implementation of Zero Trust?

  • What can we learn from hundreds of Zero Trust implementations done by ON2IT?

I want to attend this webinar

Target Audience

CIO’s, Risk officers, Risk managers, CRO’s, CISO’s, CDO’s, CPO’s, Security Architects, IT-Managers and Technology leaders

More information

When you sign up you will receive more information about the webinar. This information also details how you can participate in the webinar via your laptop or smartphone.

prof. Yuri Bobbert
Rob Maas

Webinar host: Yuri Bobbert

Prof. Yuri Bobbert is ON2IT’s CISO. Before joining ON2IT, Bobbert was the Global Chief Information Security Officer at NN Group (Nationale Nederlanden). Next to his work at ON2IT, Bobbert is also a professor at the Antwerp Management School, where his team focuses on Cyberrisk & Security research and education. He obtained his PhD at the University of Antwerp and Radboud University with his thesis Improving the Maturity of Business Information Security.

ON2IT Lead Architect Rob Maas is this webinar’s co-host. Rob is an official Zero Trust Strategist and is an experienced architect with extensive knowledge of Zero Trust, next generation firewalls and networksegmentation.