
Zero Trust: Decrypting the Myth
Zero Trust is shaping cyber security. The lecture looks at Zero Trust from different perspectives and provides practical approaches.
Topic
Identity and access managementTrend topic
When & Where
Thu, 10/27/2022, 11:45 - 12:00
Details
Format:
Management lecture
Session description
Zero Trust represents a paradigm shift in information security. For a long time, a perimeter-centric security approach was used to secure corporate resources. If actors were located within a perimeter, e.g. in the internal network, they were basically trusted. The basic assumption behind Zero Trust is that a corporate environment is no more trustworthy than a non-corporate environment. Applications, services, devices and users are not implicitly trusted.
Zero Trust is highly relevant today when it comes to securing corporate resources such as cloud services, IoT and networks. But what exactly is behind the term and how can Zero Trust be implemented? This presentation will show solution approaches that answer essential questions about Zero Trust.
Zero Trust is highly relevant today when it comes to securing corporate resources such as cloud services, IoT and networks. But what exactly is behind the term and how can Zero Trust be implemented? This presentation will show solution approaches that answer essential questions about Zero Trust.
Moderator
