Tech Spotlight: Trust is a Vulnerability: Disrupt Attack Paths with Zero Trust
With the rise of cloud services and the remote workforce, traditional perimeter security is dead. As we see a spike in malware intrusions against cloud services, a 'zero trust' approach has become a compelling need to respond to these threats. It is no longer an aspirational model for enterprises. Interestingly, 'zero trust takes an approach that says, 'Trust no one and verify everything.' Pursuing this strategy could help you mitigate risk and ensure the right people have the right level of access to the right resources.
See Also: The State of Vulnerability Management
The session will discuss:
- Building a vulnerability management program using the 'zero trust' concept
- Taking an identity-centric approach to 'zero trust' to establish the right user access
- Establish required visibility and control across infrastructure using a 'zero trust' architecture