Implementing "Zero Trust": A Practitioner's Approach
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
See Also: The State of Vulnerability Management
The session discusses:
- Progress toward adopting the zero trust model;
- Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
- Meeting stringent regulatory requirements for critical data while also devising a plan for boundary-less security.