Speaker Bio

Thomas Lintemuth

Thomas Lintemuth

VP Analyst
Thomas Lintemuth researches industry trends and best practices regarding network security technologies including zero trust, segmentation, network access control, DDoS, firewalling, and remote access.
Read More Read Less
Tuesday, June 07, 2022 / 03:00 PM - 03:30 PM EDT
Technical Insights: 5 Steps to Start the Zero Trust Journey

Zero Trust is more than a marketing term once you see through all the marketing. Organizations are building application access with Zero Trust principles. We will discuss five key items you need to know for zero trust to work for your organization

Tuesday, June 07, 2022 / 04:30 PM - 05:00 PM EDT
Crossfire Debate: Cloud Firewall — Native vs. Incumbent —The Battle Begins

Migrating resources to IaaS tenants opens up questions on how to provide network security. This session presents security and risk management technical professionals with guidance on when the appropriate option would be an incumbent firewall vendor versus a cloud-native firewall.

Wednesday, June 08, 2022 / 10:30 AM - 11:00 AM EDT
Crossfire Debate: Zero Trust — Hype or Hope?

To some, zero trust is the best path forward for information security requiring a complete rethinking of security architectures. To others, zero trust is just more of the same — with a catchier name. This session will feature multiple Gartner analysts covering zero trust arguing for and against the zero trust security paradigm. Attendees will be able to submit questions and feedback from their own zero trust journeys.

Thursday, June 09, 2022 / 12:00 PM - 12:30 PM EDT
Technical Insights: Working From Home Securely — You Need More Than ZTNA

Organizations of all types are having to allow work from home, some for the first time. Find out how enterprise controls, cloud controls and the home office controls come together to secure the remote user experience.

Friday, June 10, 2022 / 12:00 PM - 12:30 PM EDT
Technical Insights: Don't Get Burned by the Next Sunburst — How the Network can Detect Supply Chain Attacks

Sunburst showed the supply chain can be leveraged to exfiltrate data out of many enterprise environments. Learn how NDR, Segmentation, Deception and other Network controls team up to identity and stop supply chain attacks.

Join us to hear from Gartner experts and thought leaders.