4th Annual DoW Zero Trust Virtual Learning Exchange - Video Library
Register    ➤

Images

All Videos from ZT4
All Videos from ZT4
Opening Remarks: Ellena Millar & Tim Denman
Opening Remarks: Ellena Millar & Tim Denman
Nick Espinosa's The Hazards of a Fully Connected World: Why Cybersecurity Cannot Fail
Nick Espinosa's The Hazards of a Fully Connected World: Why Cybersecurity Cannot Fail

Images

Andy Ellis' Leading to Zero Trust: Principles for a Smooth Journey
Andy Ellis' Leading to Zero Trust: Principles for a Smooth Journey
Razi Rais' Zero Trust for AI Agents
Razi Rais' Zero Trust for AI Agents
Dan Lohrmann & Mark Bower's What is Confidential Computing & Why?
Dan Lohrmann & Mark Bower's What is Confidential Computing & Why?

Images

Philip Griffiths' Why Traditional Networking Fails Agentic AI: Identity-First Connectivity Matters for Zero Trust
Philip Griffiths' Why Traditional Networking Fails Agentic AI: Identity-First Connectivity Matters for Zero Trust
Discussion Panel – The Dual, Evolving Role of AI in Zero Trust
Discussion Panel – The Dual, Evolving Role of AI in Zero Trust
Alissa Valentina Knight's Unmanned Attack Surfaces: Agentic AI and Continuous Adversarial Operations
Alissa Valentina Knight's Unmanned Attack Surfaces: Agentic AI and Continuous Adversarial Operations

Images

Joseph Blankenship's
Joseph Blankenship's
Mikko Hyppönen's The New Battlefield: Cyber, Drones and Digital Warfare
Mikko Hyppönen's The New Battlefield: Cyber, Drones and Digital Warfare
Dan Bradley's Measuring Zero Trust: AI-Orchestrated Purple Teaming and Adversarial Friction
Dan Bradley's Measuring Zero Trust: AI-Orchestrated Purple Teaming and Adversarial Friction

Images

Ellena Millar's Securing Battlespace Against Agentic AI
Ellena Millar's Securing Battlespace Against Agentic AI
Don Yeske's Bridging the ZT Boundary: OpenTDF as a Critical Enabler for Sovereign, Data-Centric Interoperability
Don Yeske's Bridging the ZT Boundary: OpenTDF as a Critical Enabler for Sovereign, Data-Centric Interoperability
Open Discussion Panel – Zero Trust and the Virtual Landscape
Open Discussion Panel – Zero Trust and the Virtual Landscape

Images

Day #2 Opening Remarks
Day #2 Opening Remarks
Brian Hermann's Keynote Briefing
Brian Hermann's Keynote Briefing
Dr. Shelly Kelly's Zero Trust implementation Guidelines
Dr. Shelly Kelly's Zero Trust implementation Guidelines

Images

John Kindervag's Containment, ZT and the Security Graph - The Path to Anti-Fragility
John Kindervag's Containment, ZT and the Security Graph - The Path to Anti-Fragility
Dr. Paul Shaw's “AI-First" Warfighting: Re-inventing Existing DoW Workflows to Integrate AI
Dr. Paul Shaw's “AI-First" Warfighting: Re-inventing Existing DoW Workflows to Integrate AI
Daryl Haegley's From the Fan Chart to the Fan Room: Making Zero Trust Real in OT
Daryl Haegley's From the Fan Chart to the Fan Room: Making Zero Trust Real in OT

Images

Discussion Panel – Zero Trust for Critical Infrastructure and Operational Technology - Protecting Critical Systems
Discussion Panel – Zero Trust for Critical Infrastructure and Operational Technology - Protecting Critical Systems
Renata Spinks-McNeal's Designing for the Unbreakable Future: Zero Trust and Post Quantum Security for the DoW
Renata Spinks-McNeal's Designing for the Unbreakable Future: Zero Trust and Post Quantum Security for the DoW
Robert Johnson's OT Integrity Assurance: Detecting Cyber Attacks Inside Industrial Controllers for OT Zero Trust
Robert Johnson's OT Integrity Assurance: Detecting Cyber Attacks Inside Industrial Controllers for OT Zero Trust

Images

Steve Turner's Securing the Control Plane in a Hyper-Connected Reality
Steve Turner's Securing the Control Plane in a Hyper-Connected Reality
David Voelker's Zero Trust for Operational Technology
David Voelker's Zero Trust for Operational Technology
Phil Venables' AI and Cybersecurity: What's Happening and What's Coming
Phil Venables' AI and Cybersecurity: What's Happening and What's Coming

Images

Bryson Bort's Lessons From the Trenches: How and Why for OT Architecture
Bryson Bort's Lessons From the Trenches: How and Why for OT Architecture
Paul Coggin's Trust No Signal - Exploiting Digital Energy at Level 0
Paul Coggin's Trust No Signal - Exploiting Digital Energy at Level 0
John Kruze's ZT for Physics
John Kruze's ZT for Physics

Images

Day #3: Opening Remarks
Day #3: Opening Remarks
Konrad Wrona's Cyber Resilience by Design
Konrad Wrona's Cyber Resilience by Design
Dr. Chase Cunningham's The Mathematics of Cyberwar
Dr. Chase Cunningham's The Mathematics of Cyberwar

Images

International Track
International Track
Sean Connelly's Zero Trust as Global Policy - How Governments Are Adopting Zero Trust
Sean Connelly's Zero Trust as Global Policy - How Governments Are Adopting Zero Trust
Jennifer Minella's The Zero Trust Maturity Myth
Jennifer Minella's The Zero Trust Maturity Myth

Images

Lieuwe Jan Konig & Rob Maas' Why OT Needs ZT More Than IT
Lieuwe Jan Konig & Rob Maas' Why OT Needs ZT More Than IT
Remy Faures' Securing Global Development: The World Bank Group’s Pivot to Zero Trust
Remy Faures' Securing Global Development: The World Bank Group’s Pivot to Zero Trust
ZT Program Management Panel
ZT Program Management Panel

Images

Discussion Panel –  Resilient Zero Trust: From Single Points of Failure to Adaptive Defense
Discussion Panel – Resilient Zero Trust: From Single Points of Failure to Adaptive Defense
Discussion Panel –  Zero Trust Without Borders: Securing Allies and the Global Defense Industrial Base
Discussion Panel – Zero Trust Without Borders: Securing Allies and the Global Defense Industrial Base
Rich Mogull's When AI Breaks Security: Why ZT is No Longer Optional
Rich Mogull's When AI Breaks Security: Why ZT is No Longer Optional

Images

Tim Morrow's Tailoring Security and Zero Trust Principles to Weapon System Environments
Tim Morrow's Tailoring Security and Zero Trust Principles to Weapon System Environments
Dr. Calvin Nobles' Advancing Proactive Cyber Defense: Integrating Human and Machine Intelligence for Modern Cybersecurity
Dr. Calvin Nobles' Advancing Proactive Cyber Defense: Integrating Human and Machine Intelligence for Modern Cybersecurity

Images

Anna Campbell Mckee & Jason Garbis' Presentation
Anna Campbell Mckee & Jason Garbis' Presentation
Larry Grate's Segmenting OT Networks: Reducing Risk Without Impacting Reliability
Larry Grate's Segmenting OT Networks: Reducing Risk Without Impacting Reliability
Gary Barlet's How to visualize and microsegment modern networks
Gary Barlet's How to visualize and microsegment modern networks

Images

Lee Aguilar's Zero Trust: Training Capabilities
Lee Aguilar's Zero Trust: Training Capabilities
Mark Aller's Integrity Assurance for Zero Trust
Mark Aller's Integrity Assurance for Zero Trust
Thomas Jewkes' BitW Shield: Zero Trust for Legacy Operational Technology
Thomas Jewkes' BitW Shield: Zero Trust for Legacy Operational Technology

Images

Dr. Daniel Takabi's Agentic AI Security: Threats, Evaluation, and Defenses
Dr. Daniel Takabi's Agentic AI Security: Threats, Evaluation, and Defenses
Jerry Derrick's Addressing SOC Log Fatigue ... While Operationalizing Zero Trust
Jerry Derrick's Addressing SOC Log Fatigue ... While Operationalizing Zero Trust
Jim Smid's Making Zero Trust Actionable: How Integration and AI Turn Signals into Decisions
Jim Smid's Making Zero Trust Actionable: How Integration and AI Turn Signals into Decisions

Images

Dr. Heath Gross' Securing the Agentic Enterprise
Dr. Heath Gross' Securing the Agentic Enterprise
Dr. George Alves' FY26 and Beyond + Closing Remarks
Dr. George Alves' FY26 and Beyond + Closing Remarks
Thank you!
Thank you!