Skip to Main Content

Living on the Edge: building a secure future with Zero Trust Network Access (ZTNA) 

Orange icon of a calendar

Thursday 7th August

Orange icon of a clock

10:00 – 11:00

Orange icon of a location marker

Microsoft Teams

In a world where employees work from anywhere, cyber criminals strike from everywhere, and data lives across multiple locations, trust is no longer a given. That’s where Zero Trust Network Access (ZTNA) comes in. 

ZTNA is more than a buzzword – it’s a fundamental shift in how we approach network security. Unlike traditional models that assume everything inside the network perimeter is safe, ZTNA flips the script: no one and nothing is trusted by default, whether they’re inside or outside the network.  

Instead of opening up broad access to corporate resources based on location or credentials, ZTNA enforces strict identity verification, contextual access policies, and continuous monitoring. It provides granular, least-privilege access to only the specific apps and data a user or device needs, nothing more. 

In this interactive session, Phoenix’s cyber security experts, Jonathan Scott and Paul Jolliffe, will unpack what ZTNA really means for organisations today. From real-world implementation insights to demystifying the buzz, this session is designed to provide a clear, actionable path forward, no matter where you are on your Zero Trust journey.  

Join us to discover how ZTNA can become a cornerstone of your cyber security strategy, and how Phoenix can help guide and support you from strategy to solution building on the principle of “never trust, always verify.”

Image of a cyber security professional holding a laptop

In partnership with

One Identity logo in colour
Rubrik logo in colour
SentinelOne logo
Zscaler logo in colour

Key takeaways

Understand the core principles of the ZTNA framework and why it’s vital in today’s digital landscape 

Practical steps to begin or accelerate your ZTNA journeyfrom assessing your current posture to defining your strategy 

Technology alignment: learn how to align ZTNA with cyber security investments 

Overcoming common barriers: from user adoption to tool sprawl, learn how to navigate challenges and avoid common pitfalls 

Phoenix’s approach: Discover how Phoenix partners with organisations to assess, roadmap, and implement ZTNA strategies 

Live Q&A: put your questions directly to our experts during the live session.

Take a look at the agenda

  • Welcome and Introductions 
  • What is ZTNA? Breaking down the buzzwords 
  • ZTNA in action: building blocks and use cases 
  • How Phoenix supports ZTNA adoption: practical tools, services and roadmaps 
  • Live Q&A: ask the experts 
  • Closing remarks and next steps 

Meet your speakers

Jonathan Scott headshot

Jonathan Scott
Head of Cyber Advisory, Phoenix Software 

Jonathan brings deep experience in helping organisations shape resilient cybersecurity strategies. With a keen focus on outcome-driven conversations, Jonathan works with public and private sector customers to break down complex frameworks like Zero Trust into tangible, achievable actions. 

Paul Joliffe headshot

Paul Jolliffe
Chief Technology Security Officer, Phoenix Software
 

Paul is passionate about helping organisations defend against modern cyber threats. Drawing on his technical expertise and real-world implementation knowledge, Paul supports customers on their security transformation journeys, enabling stronger identity, device, and data protection through the Zero Trust model. 

Don’t miss out! Register now to secure your place.

Secure your spot today and hear from our experts how ZTNA will boost your cyber security strategy