Implementing Microsoft Zero Trust Solutions to Protect Users, Data & Applications

Watch 'Implementing Microsoft Zero Trust Solutions to Protect Users, Data & Applications'

Get an overview of Zero Trust architecture and the six pillars that technologists need to address for a mature implementation. Identity is the foundation.

See how leveraging Azure Active Directory as an identity provider can enhance security and compliance for third-party solutions as well as Microsoft 365 services. Get guidance on protecting devices and data using the least privileges and learn about solutions that support the “assume breach” principle. 


About the Speakers

Tony Lanzafame

Security & Compliance Solutions Specialist

Microsoft

Tony Lanzafame, Microsoft

Tony Lanzafame is a security and compliance solutions specialist at Microsoft, where he helps state and local government customers improve their security posture without compromising productivity. 

Before joining Microsoft, he was an IT manager for a multinational utility, where he led transformational and merger integration projects. 

He has a Master of Business Administration from Syracuse University and is a Certified Information Services Security Professional.

Ken Rucci

Senior Technology Solutions Professional – Cybersecurity

Microsoft

Ken Rucci, Microsoft

Ken Rucci is a cybersecurity professional with more than 25 years’ experience. 

He currently works with state and local customers to leverage the Microsoft cybersecurity solutions to secure their cloud environments. He is also responsible for providing cybersecurity briefings to CISO- and CIO-level executives to help develop a secure cloud environment.

Previously, Rucci worked at the former Computer Associates. 

He holds the CISSP and CEH certifications and has a Doctorate of Science in cybersecurity. He also serves as an adjunct professor in the Masters in Cybersecurity program at ECPI University.