Events

Zero Trust: The Role of Identity

Zero Trust: The Role of Identity
Zero Trust began a decade ago from a realization that traditional perimeter-centric security models were failing. But how does identity fit into that? What are the design principles and properties a solution should have? In this talk we discuss how we got here, and what the maturity model for Identity in Zero Trust looks like.


Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.