Cybersecurity Risk Management: A Conversation with John Kindervag on Zero Trust Strategy and Cyber Threats


McDermott Will & Emery is hosting a webinar with  ON2IT to discuss cybersecurity risk and what has become the prevailing cybersecurity strategy known as “Zero Trust.” The webinar will be a fireside chat between Todd McClelland, leader of McDermott’s Global Privacy and Cybersecurity Practice Group, and John Kindervag, the Senior Vice President of Cybersecurity Strategy and Group Fellow at ON2IT.

Zero Trust is a strategy for protecting corporate data and assets and is based on a concept that corporate networks should not automatically trust anything inside or outside its perimeter. This strategy is regarded by many industry experts as one of the best ways to stop data breaches and is embraced by many Fortune 500 companies. In addition to the widespread industry adoption of this strategy, the National Security Agency and National Institute of Standards and Technology have both recommended that government agencies adopt Zero Trust.

During the webinar, Todd and John will answer the following:

  • What does cybersecurity risk look like to most companies?
  • How do cybersecurity incidents affect companies from a legal and operational perspective?
  • Why is it important for companies to have a cybersecurity strategy?
  • How do Zero Trust concepts play into executive risk management oversight?

Please click here to register.

Registration Information

12:00 pm – 1:00 pm (EST)



Speaker: Todd McClelland, Partner, McDermott Will & Emery

Speaker: John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Cybersecurity

Dig Deeper

Webinar / Speaking Engagements / September 15, 2022

Risk Assessments Lessons Learned, Part II: Privacy

Webinar / Speaking Engagements / June 7, 2022

Risk Assessments Lessons Learned, Part I: Cybersecurity

Webinar / McDermott Event / June 2, 2022

Transfer Impact Assessment Webinar

Chicago, Illinois / Speaking Engagements / May 12, 2022

How to Pitch and Win Business—What Really Works and What Doesn’t