Topic: Redefining the Perimeter: Zero Trust & Device-Bound Access Security
The phrase “identity is the new perimeter” is often used to advocate for centralized Identity and Access Management (IAM) and the rigorous application of least-privilege principles. These concepts align with widely adopted Zero Trust Architecture (ZTA) networking models, frequently positioned as an evolution beyond traditional perimeter-based security. Yet, despite these advancements, security breaches continue to rise. In this presentation, Jim Mathews (Triangle Cyber) and David Rihak (Peig) will dissect the technical reasons why stolen credentials remain the leading cause of successful attacks—and what can be done to mitigate this persistent threat. They will explore the limitations of passwords, traditional MultiFactor Authentication (MFA), and even newer authentication methods, highlighting why these approaches fall short in ensuring truly reliable Zero Trust systems. Most importantly, they will
outline how device-bound access security can serve as a foundational element of a resilient cloud security strategy, ensuring stronger, more reliable policy enforcement across modern enterprise Zero Trust systems.
Speaker: David Rihak: CEO of Peig: David Rihak: As the CEO and co-founder at Peig, David helps organizations get rid of passwords and up their cyber game with passwordless access security. Before this, David was a Digital Identity Director at ADUCID, where he co-designed
citizen-centric identity solutions and helped develop federal and private partnerships. As a frequent speaker at security conferences, David is a vivid promoter of humancentric security architectures that leave passwords in the dust.
Speaker: James Matthews: CEO of Triangle Cyber: Jim Matthews is the Founder and President / CEO of Triangle Cyber. Jim is an Electrical Engineer and former Raytheon Engineering Fellow with over 30 years of engineering and operations experience in information technology, networks, cybersecurity, system hardening, and risk / vulnerability assessments. He has supported multiple DoD and Federal programs, including US Navy, Missile Defense Agency (MDA), and Dept of Homeland Security / Cybersecurity & Infrastructure Security Agency (DHS/CISA). He has also led engineering teams that developed mission-critical capabilities, including a global network of command & control and sensors for missile defense, a geographically distributed intrusion detection system. Jim, a strong advocate of agile methodologies, is also a Scaled Agile Framework (SAFe) Practice Consultant (SPC) and teaches SAFe certification courses. He currently serves as Chief Architect for a major DHS/CISA cybersecurity program.