The CISO’s Perspective on Identity Protection

Thursday, 13th April 10:30 AM SGT / 12:30 PM AEDT

Join us for intimate conversation with Silverfort’s CISO, John Paul Cunningham, as he discusses how Unified Identity Protection, Detect, and Response provides the cornerstone for achieving Zero Trust.

Get John Paul’s perspective on why companies get breached – despite having strong security tools deployed – and discover the merits of identity micro-segmentation to achieve true segmentation and privilege access control.


John Paul Cunningham, CISO, Silverfort

John Paul Cunningham is the Chief Information Security Officer at Silverfort, a cybersecurity company focusing on Unified Identity Threat Detection & Response and Unified Identity Protection.

He is a seasoned C-Suite Executive with over 30 years of Information Technology and Information Security leadership experience across a broad spectrum of the Fortune 10 to Fortune 1000 and has key executive roles in large, sector-leading private companies.

He has served in the Banking, Financial Services, Manufacturing, and Alternative Investment Management industries throughout his career. John Paul has served on multiple industry cybersecurity advisors and steering committees.


Silverfort allows Huntsville Hospital to enforce MFA on our privileged access accounts and has enabled us to secure our service accounts within our active directory environment.

Rick Corn
Play video

Anyone who’s serious about cybersecurity has to have MFA on any critical operation these days or they’re really not protecting themselves in the way they should.

Tom Parker
Play Video

Silverfort is the only solution that can prevent ransomware attacks by enforcing MFA on the command-line access tools these attacks use to propagate in the network.

Billy Chen
Play video

Silverfort protects our user accounts with MFA, it protects our service accounts, our on-prem apps, our Active Directory and also our custom apps.

Jim Nonn
Play video

Identity-based attacks are really important to us. Silverfort’s end-to-end risk-based authentication enables us to respond efficiently and in a timely manner.

Rusdi Rachim
Play video