Articles by SB Team
Security Leader Panel: Nonnegotiables, Challenges, and Endpoint Security in the Age of AI

Join us as a panel of security leaders discuss the challenges facing them today, endpoint security features that are nonnegotiable, and how they use theGartner® Magic Quadrant™to inform their purchasing decisions.

Register to get insights like:

  • How security program priorities have changed in the last year
  • Challenges security leaders are facing
  • How leaders are evaluating tools for their security programs
  • Real-world security applications of generative and agentic AI

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Speakers:

Ryan Priest

CIO, Verto

John Lemko

Director Of Cybersecurity Operations, Canadian Credit Union

Doug Vondera

Field CISO, SentinelOne

Read More ...
Scaling Zero Trust: Real-World Lessons and Practical Moves

Zero Trust is no longer just a CISO priority, it’s a team effort. Whether you're setting the strategy or executing the details, the challenge is the same: how do you apply Zero Trust without slowing the business down?

This webinar will share what it really takes to scale Zero Trust from aligning stakeholders to strengthening your security posture. We’ll cover how teams are tackling exposure across identities, devices, and data; managing configuration drift; and driving control improvements with the resources they already have. We’ll also show how Reach helps operationalize Zero Trust by prioritizing action, enforcing policy, and validating posture continuously.

Topics include:

  • Where to start: Mapping Zero Trust initiatives to business goals and technical realities
  • Security + usability: Enforcing policies without breaking workflows
  • Making it threat-informed: Adapting controls to evolving attack techniques, not just checklists
  • Posture and configuration: Continuously validating that Zero Trust controls are working as intended
  • Driving change: Overcoming resistance and delivering progress across teams

If you’re working to implement or scale Zero Trust in your organization, this session will help you connect strategy to execution.

Speaker:

Tommy Hui

Tommy Hui

VP of Global Sales Engineering, Reach Security

Tommy is a seasoned cybersecurity professional with extensive experience in helping organizations protect themselves from cyber threats. Currently, at Reach Security,Tommy focuses on empowering businesses to proactively harden their environment with a cutting-edge platform that reduces risk and exposures.

Before joining Reach Security,Tommy led Sales Engineering efforts at Dazz, specializing in unified vulnerability and application security posture management, ensuring organizations could effectively identify and remediate security risks. Prior to that, Tommy helped scale the Sales and Sales Engineering team at SentinelOne leading up to their IPO.

Earlier in his career,Tommy held roles that focused on Network DLP, Security Analytics, and also worked as a DoD employee supporting cryptographic modernization and cyber weapon system program offices. With a deep understanding of cybersecurity technologies and a passion for protecting organizations from emerging threats,Tommy continues to drive innovation and security excellence in the industry.

Read More ...
Subscribe for the Latest News
Webinars
Passwordless Authentication: A Practical Approach to Modernizing Access
The End of the Exposure Window? What Claude Mythos and Glasswing Mean for Security Leaders
From Reactive to Resilient: Agentic AI and the Future of Cyber Defense