Implementing "Zero Trust": A Practitioner's Approach
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
See Also: Cybersecurity Struggles: The Midmarket's Complex Battle
This session will also discuss:
- Improved privileged access management using 'zero trust';
- Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
- A five-step methodology to implementing 'zero trust' and stakeholder engagement.