
Implement Zero Trust successfully
We provide tips for expanding the IAM and transforming existing security systems on the way to a functioning ZTA.
Topic
When & Where
Details
Format:
Management lecture
Session description
Setting up a functioning zero trust architecture (ZTA) and integrating it into the existing IT landscape poses many challenges. And although zero trust is now a firmly established IT security model and there is an almost immeasurable choice of technology available for the respective implementation, the practical introduction in many companies is often difficult. Many projects already get stuck in the conception phase or repeatedly falter at characteristic points of the implementation.
The reasons for this often include design weaknesses or lack of expansion of existing security systems and protection mechanisms, which in many cases still need to be adapted or improved to reach the required level. However, supplementing existing security solutions with new components and i ...