<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Secure Application Access for All Your Users

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by Menlo


On Demand
Anytime

How can you safely give employees and contractors access to applications while staying secure? Security can’t be a roadblock—employees need access to corporate apps and data without friction. At the same time, you need to make sure only authorized individuals are accessing those critical apps. VPNs are an old and painful technology. VPNs were never designed to operate at large scale—they were designed for some workers who needed access from the road, not for nearly 100% remote working. Additionally, VPNs are overly permissive—you can’t tailor access to specific individuals. 

The MPA platform is different from a cloud access security broker (CASB). Zero Trust Network Access (ZTNA) provides employees remote access to applications, data and services based on clearly defined access control policies, either for a specific role or an employee.

Eric Schwake
Sr. Manager of Cybersecurity Strategy - Menlo Security
Eric Schwake is a Senior Manager of Cybersecurity Strategy for the Menlo Security solution stack. Before coming to Menlo Security Eric worked with the security products at Proofpoint and covered security products at Cisco and Symantec before that. Eric has over 17 years of information security experience with a range of positions from Technical Support to Sales to Product Marketing. Eric holds a CISSP certification.
Dan Kirsch
Managing Director & Co-Founder - Techstrong Research
Daniel (Dan) Kirsch, Managing Director and Co-Founder of Techstrong Research is a consultant, IT industry analyst, and thought leader focused on how emerging technologies such as AI, machine learning, and advanced analytics are impacting businesses. Dan is particularly interested in how businesses use these emerging technologies to alter their approaches to information security, governance, risk, and ethics. Dan provides advisory services directly to leadership at technology vendors that design and deliver security solutions to the market. He assists them in aligning their solutions with enterprise requirements. Dan is viewed as an expert in understanding security solutions and mapping them to the complex needs of business across industries.
Mitch Ashley
Principal - Techstrong Research
Mitchell Ashley is a renowned strategist, speaker, advisor and technology executive. He has led successful IT, SaaS and cybersecurity transformations, as well as multiple teams in developing and bringing to market successful online services, cybersecurity, software and networking products and services.
Mitch serves as principal at Techstrong Research, where he is part of a team of preeminent experts in digital transformation, DevOps, cloud-native, cybersecurity, data and AI/ML. In this role, he works with companies to align digital transformation and technology strategies to achieve disruptive goals and high-impact outcomes. Mitch also serves as Techstrong Group CTO. He is in demand as a speaker and is widely followed online on his podcasts, Analyst Corner commentary and interviews on the highly popular Techstrong TV streaming video program, where he engages with top digital and tech leaders from across the industry.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.