Ethical Hacking Meets Zero Trust: Securing the Modern Perimeter 

You are here:
Date: October 31, 2025
Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST

Topic: Ethical Hacking Meets Zero Trust: Securing the Modern Perimeter

Register Now

Abstract: As cyber threats grow more sophisticated, traditional perimeter-based security models are no longer sufficient. The current webinar aims to explore the role of ethical hacking techniques in establishing Zero Trust Network security across the organization’s digital infrastructure. The webinar discusses how ethical hacking can be aligned with Zero Trust and identity-driven security to proactively identify vulnerabilities, validate controls, and strengthen organizational defenses. Join us to gain insights into how red teaming, penetration testing, and threat simulations can support continuous verification and adaptive trust models in modern hybrid environments.

Key Takeaways: 

  • Understanding the Intersection ethical hacking and ZTNA
  • Challenges of evolving cloud-native and remote-first environments.
  • Applications of red teaming to validate Zero Trust implementations.
  • Tools and methodologies involved with ethical hackers for ZTNA
  • Understand ethical hacking’s role to help organizations move to proactive security

Speaker:

Tejas Shroff, Senior Director of Managed Security Services, NTT DATA

Bio:  Tejas Shroff is the Senior Director of Managed Security Services at NTT DATA, where he leads the identity and access management practice. He is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cybersecurity courses to graduate students at the Jindal School of Management. Tejas is a board member of the FBI-affiliated non-profit InfraGard National, serves on the advisory board for Collin College’s cybersecurity program, and mentors the UTD Cybersecurity Club.

Share this Article

Facebook
Twitter
LinkedIn
WhatsApp
Pinterest

You may also like

Train with EC-Council

  • By clicking the Submit button, I give my consent to the processing of my personal data, including for promotional purposes, as provided in the Privacy Policy, and agree to the Terms.

Cyber Talks
Recent Posts