BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISSA - Sacramento Valley Chapter - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISSA - Sacramento Valley Chapter
X-ORIGINAL-URL:https://sacramento.issa.org
X-WR-CALDESC:Events for ISSA - Sacramento Valley Chapter
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20260308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20261101T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250418T113000
DTEND;TZID=America/Los_Angeles:20250418T130000
DTSTAMP:20260420T011414
CREATED:20250327T062610Z
LAST-MODIFIED:20250414T041652Z
UID:324-1744975800-1744981200@sacramento.issa.org
SUMMARY:ISSA Sacramento Valley Chapter Meeting - 4/18/2025 - Zero Trust
DESCRIPTION:Speaker: Surendra Narang\, Senior Manager\, Cyber Security\, Palo Alto Networks \nTopic: How to implement the Zero Trust security model \nSynopsis: Due to the rise of sophisticated cyber threats and the erosion of traditional network boundaries due to cloud adoption and hybrid work\, enterprises are increasingly embracing the Zero Trust security model. Unlike legacy perimeter-based approaches\, Zero Trust is grounded in the principle of “never trust\, always verify\,” meaning that every user\, device\, and application must be continuously validated\, regardless of location or network status. \nSuccessful deployment of Zero Trust is not a one-time implementation but a strategic\, iterative transformation that requires a methodical\, multi-phase approach. It starts with a comprehensive assessment of the organization’s security posture\, then identifying high-value assets\, key user roles\, and critical data flows. From there\, enterprises implement granular\, least-privilege access controls\, adaptive authentication mechanisms\, and continuous monitoring. \nSpeaker Bio: Surendra Narang is a seasoned cybersecurity leader with deep expertise and a strong focus on zero-trust architecture\, security transformation\, and enterprise-scale implementations. As Senior Manager of Cybersecurity at Palo Alto Networks\, he led the end-to-end design and deployment of Zero Trust Security Architecture\, embedding its core principles—least privilege access\, continuous verification\, and segmentation—into the fabric of the organization’s infrastructure and security products. \nMeeting Details: This is a hybrid meeting (both in-person and on-line). You may attend remotely via Zoom (See information below) or attend in person at CapCity (see the address below). \nPlease register for the meeting below.  \nYou don’t have to be a member of ISSA to attend our meetings (but we encourage you to join us!). Please share information about this meeting with your friends and colleagues who have an interest in information security. \nThis is a hybrid meeting on Zoom and in-person. \nTo join Zoom Meeting:\nhttps://us06web.zoom.us/j/83647622654?pwd=egFeyV3WaTq2sT6UZi6aSiD0JyoUWX.1 \nMeeting ID: 836 4762 2654\nPasscode: 838063
URL:https://sacramento.issa.org/event/issa-sacramento-valley-chapter-meeting-4-18-2025-zero-trust/
LOCATION:Capsity\, 3808 Broadway\, Sacramento CA\, Capsity\, 3808 Broadway\, Sacramento\, CA\, United States
CATEGORIES:ISSA Sacramento chapter meetings
ORGANIZER;CN="Mark Heckman":MAILTO:programming@issa-sac.com
END:VEVENT
END:VCALENDAR