Zero Trust Myth-Busting

Zero Trust Myth-Busting
Following the 2021 RSAC conference keynote by Cisco CEO Chuck Robbins on the importance of Zero Trust, the concept has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the Zero Trust Promised Land. There has been more marketing around ZT than for any prior cybersecurity product, technology or service. The outcome? Confusion, cynicism and outright rejection of ZT principles, based on misinformation and overly hyped vendor solutions that had nothing to do with Zero Trust. It’s a product, a service, a reference architecture, a strategy, a concept, a direction and a lifestyle. But, in reality, it is none of those things. Zero Trust is a set of guiding principles for re-architecting networks and computing environments that reduces the overall attack surface, removes excessive trust, improves identity authentication and monitors activity and behavior to discover anomalies before systems are breached. Zero Trust leverages existing cybersecurity products, such as microsegmentation, identity access and application security, and it can be implemented in small chunks to incrementally improve an organizations’ security posture. This session dissects some of the Zero Trust myths.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.