Events

'Zero Trust': Great Concept, Bad Name

'Zero Trust': Great Concept, Bad Name
Speaker:
Alain Sanchez, EMEA CISO and Senior Evangelist, Fortinet
Vishal Salvi, Senior Vice President and CISO, Infosys

The COVID-19 pandemic ushered in a surge of cyberattacks, including ransomware, botnets and even adaptations of the old Mirai malware. Amidst this chaos, the "zero trust" concept is a pillar of superior cybersecurity, providing a way to permanently and dynamically assess whether any device, application, object, or entity should have the right to access network resources. This approach embraces devices, management and, of course, the users. But does it mean companies will have to stop trusting their employees, customers and partners?

The session discusses:

  • Using "zero trust" can be a pillar of digital innovation;
  • Providing improved access control for users;
  • Creating a mature "zero trust" model.

Fireside Chat: 'Zero Trust' A Holistic Vision

Speakers:
Alain Sanchez, EMEA CISO and Senior Evangelist, Fortinet
Vishal Salvi, (Fireside Chat Speaker)Senior Vice President and CISO, Infosys

If an organization moves to the "zero trust" model for cybersecurity, should it stop trusting its employees, customers and partners? Should the zero trust approach include the dynamic assessment of whether any device, application, object or entity should have access to network resources? And what are the other essential aspects of successfully adopting the zero trust model?

In this "fireside chat" session, two experts discuss why the zero trust model is essential in today's environment - and how to successfully adopt it.


  • 'Zero Trust' network access is not a negative connotation but an important strategy for future;
  • 'Zero Trust' a holistic vision of a trust that is continuously earned rather than granted;
  • What becomes pivotal to the success of a 'zero-trust' model.


Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.