SECURITY BREACH? CALL 888.234.5990 EXT 9999

WEBINAR

Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs

Meet The Presenters

Adam Berger

VP, Managed Services & CISO
Adam Berger has over 20 years of experience in Information technology with a diverse technical background including managing cloud service provider platforms, supporting enterprise systems, leading IT security programs, and maintaining mission critical IT infrastructure.

Rich Lily

Field CTO, Security

Rich Lilly has been working in the IT Consulting space for 20+ years in various positions and roles, including Architect, Director of Pre-Sales, Cloud Evangelist, and Director of Security for Netrix, LLC. Rich brings extensive hands-on and practical knowledge to not only strategy for Microsoft-centric Security solutions, but also developing and operating Security Programs. 

Alane Kochems

Lead Security Consultant
Alane Kochems is a Lead Security Consultant with Netrix Global and provides vCISO services to clients in multiple industries. She has over 20 years of experience working in cyber security, risk management and technology policy.

Alex Shi

Managing Consultant, Red Team Lead
Alex manages the Offensive Security team at Netrix. He has diversified experience working within IT operations, security program management, and hands-on security testing engagements. Alex continuously maintains the technical skillsets required to collaborate with front-line IT teams, leading various security engagements from network penetration testing, application testing, cloud assessments, physical security, wireless, purple teaming, and ransomware simulation assessments.

About this talk

In this roundtable discussion on Zero-Day Exploits, our expert panelists delve into the critical role of effective governance and the identification of threats through comprehensive risk assessments, robust vulnerability programs, thorough security assessments, and proactive offensive security measures. Watch now to gain valuable insights and practical strategies to enhance your cybersecurity posture.

SHARE THIS

Let's get problem-solving