Governance & Risk Management , Identity Governance & Administration

Managing Identity in a 'Zero Trust' Environment

Nexus' Tejas Lagad on the Value of the Model
Tejas Lagad, country director, Nexus

Why is identity at the core of the "zero trust" approach? Tejas Lagad of Nexus shares insights.

See Also: User Entity & Behavior Analytics 101: Strategies to Detect Unusual Security Behaviors

In a video interview at Information Security Media Group’s recent Cybersecurity Summit in Mumbai, Lagad also discusses:

  • The definition of zero trust;
  • Best practices to follow under zero trust;
  • Why zero trust can play an important role.

Lagad is country director at Nexus, where he is responsible for overall leadership for the sales, presales and support team in Asia. Prior to joining Nexus, he was director of product management at Symantec.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.