Training

Events

Identity-Centric Approach to 'Zero Trust': Going Beyond Perimeter Security

Identity-Centric Approach to 'Zero Trust': Going Beyond Perimeter Security

The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.

See Also: The Fraudster's Journey - Fraud in the IVR

Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.

This session addresses:

  • The shifts in the security landscape that paved the way for zero trust;
  • How the zero trust ecosystem will look;
  • Building an effective zero trust program and architecture.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.