Identity-Centric Approach to 'Zero Trust': Going Beyond Perimeter Security
The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.
See Also: How to Take the Complexity Out of Cybersecurity
Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.
This session addresses:
- The shifts in the security landscape that paved the way for zero trust;
- How the zero trust ecosystem will look;
- Building an effective zero trust program and architecture.