May 2026 Lunch N Learn
This event will be both educational and informative. Attendees are eligible to earn ISC2 and ISACA CPE credits by providing their membership numbers. Certificates for ISC2 and ISACA CPEs will be issued following the event.
Speaker:
G. Mark Hardy is the President of National Security Corporation and has been a trusted provider of information security expertise to government, military, and commercial clients for over 30 years. A long-standing industry veteran, he has led the information security consulting firm he founded in 1988.
G. Mark is the author of the Information Security Handbook for Enterprise Computing and the Client/Server Security Handbook, and he is a contributing author to Network Security Secrets. He has served on three ANSI committees responsible for developing security standards for the financial and e-commerce industries.
A retired Captain in the U.S. Navy Reserve, G. Mark is the former President of the 20,000-member Association of the United States Navy and has served in command nine times throughout his distinguished military career.
Event Sponsors:
& ![]()
Title of Event: Creating Zero Trust with Allowlisting and Ringfencing
Event Summary:
Join us at Charley’s as we break down how allowlisting and ringfencing can help organizations move beyond reactive security and build a true Zero Trust framework.
In a landscape where even a small gap in ransomware protection can have major consequences, this session will highlight how to reduce risk by controlling what runs in your environment, limiting lateral movement, and minimizing alert fatigue. We will also touch on modern challenges like securing AI systems and navigating implementation hurdles, giving you a practical path to better protect critical assets.
We will also feature Zscaler and Tanium, two leading cybersecurity platforms that work together to strengthen enterprise security by combining zero trust access with real time endpoint visibility and control, enabling organizations to securely connect users to applications while continuously monitoring, detecting, and responding to threats across their entire environment at scale.
Agenda: (Agenda time may be changed or updated – Lunch will be served during the presentation)
11:00 – 11:25 Registration
11:25 – 11:40 Welcome and Introductions
11:40 – 11:55 Tanium Presentation
11:55-12:10 Zscaler Presentation
12:10 – 12:45 G Mark Presentation
12:45 – 1:00 Q & A / Presentation Conclusion
