'Zero Trust': The Foundation for Next-Generation Security
One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?
See Also: Stopping BEC and EAC
As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.
This session addresses:
- Why zero trust is the right foundation for next-generation security architecture;
- Why network wide visibility is the foundation of an effective zero trust strategy;
- How to implement a zero trust strategy in a phased and cost-effective way.