Post Mythos: Plan For The Inevitable Breach

Date: Tuesday, June 2 at 11 am PT / 2 pm ET

Mythos is accelerating how quickly attackers discover pathways, exploit weaknesses, and move laterally across your environment. Your team needs containment as a core security discipline, not an afterthought.

In this webinar, we’ll share practical guidance to take action against advanced exploitation and limit exposure to vulnerable systems. You’ll learn how to gain real-time network visibility into east-west traffic across data center and cloud environments, identify high-risk communication paths, and apply controls that reduce exposure without disrupting the business.

We’ll cover a step-by-step approach from ringfencing applications and enforcing broad controls, to structuring segmentation across environments and application tiers, and ultimately implementing policy-based security enforcement and precise workload isolation. You’ll learn how to operationalize segmentation so it scales and continuously adapts to change. Walk away with actionable guidance your team can use to reduce lateral movement, shrink blast radius, and contain breaches before they escalate.

What You’ll Learn:

  • How to harden your environment to increase the difficulty for attackers
  • Priority steps to reduce your blast radius and contain the attack
  • Evolve from basic ringfencing to Zero Trust segmentation and continuous policy enforcement

Register now!

About the presenters:

Christer Swartz, Director of Industry Solutions, Illumio

Christer Swartz is Director of Industry Solutions for Illumio. He has spent many years in the Networking industry, beginning with a small startup called Cisco. He joined Cisco when their global head-count was 50 people, he was an early CCIE, and remained with them for 9 years.
He has worked in the Caribbean, in Europe, and also for a small company called Netflix, when their business model was built around red envelopes and DVD's, then designed their Internet-streaming model to host movies, without breaking the Internet. He worked for many years for Palo Alto Networks, when the industry finally realized that cybersecurity was not just a good idea but is a business enabler.
Application visibility & security needs to be fully agnostic to the network or any security appliances, enabling a fully application-centric approach to seeing who is doing what to whom everywhere, and how to enforce it.
100% of us will eventually be breached; no one is too small of a target, so a breach needs to be assumed but the goal is containing it, preventing a small problem from becoming a disaster. Christer will explain how.


Rajoo Nagar, Senior Cybersecurity and Zero Trust Marketing Leader, Illumio

Rajoo Nagar is a senior cybersecurity and Zero Trust marketing leader responsible for microsegmentation at Illumio. With more than 20 years of experience in enterprise networking and security, she has led product marketing, go-to-market strategy, and thought leadership initiatives across technologies including Zero Trust, segmentation, SASE, and secure access. Rajoo holds a Master’s degree in Computer Science and an MBA, and is the author of Telecom Service Rollouts, published by McGraw-Hill Professional.
Prior to Illumio, Rajoo held senior roles at Pulse Secure, Fortinet, Cisco, and Juniper Networks, where she helped drive product strategy and accelerate market adoption of enterprise security solutions.

Date: 06/02/2026

Time: 11:00 AM PT

Duration: 1 hour


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.