Inside Zero Trust World 2026: Opening Impressions from the Show Floor – ZTW26 #1
Doug White and Jeff Man kick off coverage from Zero Trust World 2026 in Orlando, sharing first impressions from the conference floor. They discuss the event’s growing scale, the unique audience of IT practitioners and MSPs, and how ThreatLocker’s conference blends security strategy with practical operational insights. The conversation also explores the expanding role of hands-on hacking labs, the importance of bridging security and IT operations, and what makes this conference distinct from traditional security events.
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
Viable Defense Strategies Against Zero Days and Supply Chain Risks – Eoin McGrath – ZTW26 #1
Zero Day exploits and supply chain attacks have shifted from being rare occurrences to being an everyday threat. Learn how to be pragmatic and build a playbook and leverage ThreatLocker controls to help you:
•Build Zero trust paths in your organization
•Manage “unknown unknowns”
•Rapid containment
•Produce Data and Alerts that matter
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
Eoin McGrath works as the Onboarding Engineer Manager for ThreatLocker EMEA, with over 20 years of experience in the MSP and Software Development fields, bringing breadth of experience which helps deliver robust solutions for customers. Eoin is based in Ireland and likes to visit historic sites to escape from IT!
Stopping the Unstoppable: Neutralizing Modern Data Exfiltration with Storage Control – Cristiano Guerrieri – ZTW26 #1
Analyze Exfiltration Pathing: Identify common modern methods of data exfiltration, such as social engineering, session hijacking (cookies), and the use of authorized software for malicious purposes.
Evaluate Application Permissions: Understand the risk associated with the "Full Access" model, where any software opened by a user can access everything that user has permission to see.
Implement Granular Controls: Learn to apply Zero Trust principles by using storage control policies to restrict data access to only pre-approved, necessary applications.
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
With over 20 years of experience in network engineering, cybersecurity, and IT solutions, Cristiano has a proven track record of delivering innovative, high-impact solutions across multiple domains and industries.
He began his career at the Italian Ministry of Telecommunications and later contributed to Telecom Italia Network’s Security and Network Operations Centers. After gaining international experience in Ireland with Virtual Access Ireland and Interop Technologies, Cristiano advanced to Director of Solution Engineering at Ubiqube, managing global teams in automation and integration.
Currently, as a Solutions Engineer at ThreatLocker, Cristiano focuses on endpoint security, specializing in application whitelisting and threat prevention. His expertise helps businesses protect against ransomware, viruses, and other software-based threats through simple, effective security solutions.
Endpoint Hardening in 5 Minutes: No gpupdate Required with Configuration Manager – Amanda Makowsky – ZTW26 #1
This session to uplevel your configuration knowledge. No AD server required, remote and hybrid work friendly, and gpupdate is now one more thing of the past.
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
Amanda Makowsky is a Onboarding Solutions Engineer dedicated to helping partners learn and implement ThreatLocker in their environments. While her background has spanned from restaurant management to bookkeeping, her passion for people and learning led to a career in IT starting at a MSP before finding her way to ThreatLocker. Outside of work she is typically found with her family at their various extracurricular activities (High School Marching Band is a full time job on its own), or working on a CO2 laser project.
Securing Remote Workforce – Erik Jansen – ZTW26 #1
We'll review steps you can take to protect devices no matter where they connect, including:
•Inventory, monitor and control applications: Ensure your company has the capability to limit what applications are on machines, and what these applications may have access to through Ringfencing
•Protect inbound traffic to remote devices: Protect your east-west traffic on the endpoints with a robust endpoint firewall tool leveraging Dynamic ACLs (Dynamic Port Management). Block all inbound traffic and only allow limited outbound traffic through common ports
•Detect any indications of compromise: Pair these controls with an in-depth detection tool (ThreatLocker Detect) that watches for potential malicious behavior and alert/automate responses to these behaviors both on the Endpoint and in your M365 environment with Cloud Detect/Control
•Manage Web Content on machines off the company network with Web Control
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
As a ThreatLocker Solutions Engineer, Erik Jansen focuses on fortifying digital assets through cutting-edge cybersecurity solutions. With a dedication to Zero Trust principles, Erik specializes in application, network, and storage control, as well as EDR and MDR deployment. His role encompasses not just technical understanding but also customer success, ensuring that the cybersecurity products we deliver are seamlessly integrated and effective.
Defense Against Configurations – Bruce Mines – ZTW26 #1
Missing or incomplete configuration settings can create large gaps for attackers to exploit. Join this session for practical strategies to identify and eliminate misconfigurations which leave an organization at risk and out of compliance. Learning objectives:-Learn techniques to keep your organization compliant with major frameworks-Discover configuration gaps of opportunity to strengthen your security posture-Increase integrity and data security across the organization.
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
With over 20 years of experience in technology consulting, Bruce brings deep expertise in Cybersecurity, Cloud, Data Protection, Storage management solutions, and Business Continuity best practices, helping organizations design resilient, scalable, and effective IT environments.














