Implementing 'Zero Trust': A CISO's Journey
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The 'Zero Trust' model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a 'Zero Trust' architecture. This session provides a practical approach to adopting 'zero trust', outlining the strategy, the possibilities for leveraging existing investments, and the need for new investments.
The session discusses:
- Improved privileged access management using 'Zero Trust';
- Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
- Essential steps for implementing 'Zero Trust' and stakeholder engagement.