2018 Washington DC Breach Prevention Summit , Governance

How to Implement the Zero Trust Security Model

How to Implement the Zero Trust Security Model

Snowden proved you can't trust on the inside. OPM proved you can't trust the outside. Who should you trust when it comes to your data? No one! In this provocative and informative presentation, retired Brigadier General Greg Touhill, the first Chief Information Security Officer of the U.S. government and current president of the Cyxtera Federal Group, will discuss how nation state actors, cyber criminals, and hackers leverage fundamental weaknesses in TCP/IP, tools, and architectures to breach current cyber defenses and what you can do to stop them. He will recommend a common sense approach to harden your people, processes and technology against cyber threats while delivering results that are effective, efficient, and secure.

In Development

Request to be notified when this session is made available.

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.