An Identity Centric Approach to ‘Zero Trust’: A Practitioner’s Approach
The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, shows that we can no longer have a perimeter-centric view of security. The “zero trust” security model emphasizes that enterprises can no longer have a “trusted” internal network and an “untrusted” external network. Instead, we need to securely enable access for the various stakeholders regardless of their location, device, or network.
While identity and access management are essential to a 'zero trust' strategy, implementing an adaptive, risk-based authentication process for remote systems is proving effective as more staff members work from home, with people being the new perimeter.
The session will discuss:
- The shifts in the security landscape that paved the way for 'zero trust'
- How the zero trust ecosystem will look
- Building an effective zero trust program and architecture