msg - header 2

Zero Trust: Decrypting the Myth

Zero Trust is shaping cyber security. The lecture looks at Zero Trust from different perspectives and provides practical approaches.

Topic

Identity and access managementTrend topic

When & Where

calendar_month

Thu, 10/27/2022, 11:45 - 12:00

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

Zero Trust represents a paradigm shift in information security. For a long time, a perimeter-centric security approach was used to secure corporate resources. If actors were located within a perimeter, e.g. in the internal network, they were basically trusted. The basic assumption behind Zero Trust is that a corporate environment is no more trustworthy than a non-corporate environment. Applications, services, devices and users are not implicitly trusted.

Zero Trust is highly relevant today when it comes to securing corporate resources such as cloud services, IoT and networks. But what exactly is behind the term and how can Zero Trust be implemented? This presentation will show solution approaches that answer essential questions about Zero Trust.

Moderator