
Format:
Management lecture
Setting up a functioning zero trust architecture (ZTA) and integrating it into the existing IT landscape poses many challenges. And although zero trust is now a firmly established IT security model and there is an almost immeasurable choice of technology available for the respective implementation, the practical introduction in many companies is often difficult. Many projects already get stuck in the conception phase or repeatedly falter at characteristic points of the implementation.
The reasons for this often include design weaknesses or lack of expansion of existing security systems and protection mechanisms, which in many cases still need to be adapted or improved to reach the required level. However, supplementing existing security solutions with new components and i ...