Back

Making Zero Trust A Reality

Executive Boardroom - 2:30 pm - 2:55 pm

Implementing a zero trust security strategy involves two bodies of work. One is preparing your applications and data for access on the public internet as well as segmenting your internal network to stop traverse attack and is often described as the companies digital transformation. The second is enabling and controlling access to those resources based on a level of trust, starting at zero, ascribed to the endpoints attempting to access them. Many organizations have made significant progress on their digital transformation, but continue to use legacy approaches to endpoint management that undermine the zero trust model. This session will examine modern approaches to establishing and continuously monitoring endpoint trust.