Governance & Risk Management , IT Risk Management
Identity Security and the Quest for Zero Trust
Stephen Cox of SecureAuth on the Passwordless FutureForget inside/outside the perimeter when mitigating risks. That's the notion behind "zero trust," which means applying risk-based controls to safeguard access, says Stephen Cox of SecureAuth.
In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Cox discusses:
- Cloud service attack trends;
- Best practices for mitigating risks;
- How to make the concept of "zero trust" work in practice.
Cox is vice president and chief security architect at SecureAuth. He has nearly 20 years of experience in the IT industry, including 10 years leading software development teams in the security industry. Previously, Cox served as technical lead of the endpoint and FireEye-as-a-service development teams at FireEye/Mandiant. Earlier, he worked at RSA NetWitness as principal developer of NetWitness Spectrum, served a number of years at VeriSign in support of the DNS resolution operations team, and also served in various software development roles at Northrop Grumman and America Online.