Securing Applications from Vulnerabilities with Zero Trust

In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise. Join ThreatLocker’s Director of Cybersecurity, Ben Jenkins, as he discusses how to secure applications from vulnerabilities using a Zero Trust model.

Ben Jenkins


Ben Jenkins the Director of Cybersecurity at ThreatLocker. With over 8 years of experience working within the technology sector, Ben specializes in working with SME’s, helping them implement technical solutions that will grow and scale their businesses. As a cybersecurity expert, Ben spends most of his free time educating others about the importance of keeping up-to-date with the latest technologies in order to better protect businesses. Ben has presented at many major events across the globe, and taken.