Implementing "Zero Trust": A CISO's Journey
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a 'zero trust' architecture. This session provides a practical approach to adopting 'zero trust', outlining the strategy, the possibilities for leveraging existing investments, and the need for new investments.
The session discusses:
- Improved privileged access management using 'zero trust';
- Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
- Essential steps for implementing 'zero trust' and stakeholder engagement.