Cloud Security , Digital Identity , Governance & Risk Management

OnDemand | Zero Trust & the Identity Perimeter

Extending the Chain of Trust

We hold these 3 truths to be self evident: the internet is our network, the cloud is our data center, and any device is a work device. Therefore, identity is the new perimeter. It's not that network-based protection/detection controls are dead: they are simply inadequate in enabling a Zero Trust security approach.

View this webinar as we discuss:

  • The impact of cloud first;
  • How organizations are adopting identity-base perimeters as a fundamental Zero Trust building block
  • The implications for Identity and Access Management tooling moving forward will be covered

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.