Risk is Danger
Fill out the form to watch the full video
About the Webinar
In this video, John Kindervag discusses the concept of risk management in cybersecurity, emphasizing the need to shift from traditional risk assessment to a focus on danger management. He shares a personal story about his nephew’s battle with cancer to illustrate the unpredictability of risk and the importance of proactive measures. Kindervag introduces the Zero Trust model as a strategy for protecting sensitive data and assets, advocating for a more dynamic and responsive approach to cybersecurity. He concludes by encouraging listeners to prioritize danger management to create safer environments.
Meet the Speaker
John Kindervag
Illumio, Chief Evangelist
John Kindervag is considered one of the world’s foremost cybersecurity experts. With over 25 years of experience as a practitioner and industry analyst, he is best known for creating the revolutionary Zero Trust Model of Cybersecurity. As Chief Evangelist at Illumio, John Kindervag is responsible for accelerating awareness and adoption of Zero Trust Segmentation.
Most recently, John led cybersecurity strategy as a Senior Vice President at On2IT. He previously served as Field CTO at Palo Alto Networks and, before that, spent over eight years as a Vice President and Principal Analyst on the security and risk team at Forrester Research.
In 2021, John was named to the President’s National Security Telecommunications Advisory Committee (NSTAC) Zero Trust Sub-Committee and was a primary author of the NSATC Zero Trust report that was delivered to the President. That same year, he was also named CISO Magazine’s Cybersecurity Person of the Year. John serves as an advisor to several organizations, including the Cloud Security Alliance and Venture Capital firm NightDragon.
Illumio
Illumio, the breach containment leader, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio Zero Trust Segmentation Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which allow only necessary communication, and automatically isolates ransomware and breaches.