Defining a "Zero Trust" Architecture for a Remote Workforce

Defining a "Zero Trust" Architecture for a Remote Workforce

The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.

See Also: Cybersecurity workforce development: A Public/Private Partnership that enhances cybersecurity while giving hands-on SOC experience to students

The session offers insights on:

  • Continuous authentication for a zero trust approach;
  • Key security tenets of zero trust;
  • Creating an effective access control strategy

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.