Implementing "Zero Trust": A Practitioner's Approach

Implementing "Zero Trust": A Practitioner's Approach

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.

See Also: Cybersecurity workforce development: A Public/Private Partnership that enhances cybersecurity while giving hands-on SOC experience to students

The session discusses:

  • Improved privileged access management using 'zero trust'
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • A five-step methodology to implementing 'zero trust' and stakeholder engagement.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.