Case Study: The Road to Zero Trust Security
Where does the journey to ‘zero trust’ begin, what are the typical entry points, and how can it unfold? Experts agree that ‘zero trust’ is based on the premise of ‘assume breach,’ and treat every asset as breached and all traffic as hostile.
The session will cover:
- How the approach to security has changed dramatically as security perimeters have dissolved
- Assessing the maturity of the ‘zero trust’ state with a realistic look at security and its dependencies on other functions in securing future work environments
- Aligning ‘zero trust’ with people, processes and technologies to establish security