An Identity Centric Approach to ‘Zero Trust’: A Practitioner’s Approach

The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, shows that we can no longer have a perimeter-centric view of security. The “zero trust” security model emphasizes that enterprises can no longer have a “trusted” internal network and an “untrusted” external network. Instead, we need to securely enable access for the various stakeholders regardless of their location, device, or network.

While identity and access management are essential to a 'zero trust' strategy, implementing an adaptive, risk-based authentication process for remote systems is proving effective as more staff members work from home, with people being the new perimeter.

The session will discuss:

  • The shifts in the security landscape that paved the way for 'zero trust'
  • How the zero trust ecosystem will look
  • Building an effective zero trust program and architecture

In Development

Request to be notified when this session is made available.

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.