Header of Serviceware SE

Seven steps to a true Zero Trust architecture

Zero Trust: No trust zone. Every access must be verified. Your steps for a successful architecture.

Topic

Cloud SecurityData security / DLP / Know-how protectionIndustry 4.0 / IoT / Edge ComputingManaged Security Services / HostingMobile SecuritySecure HomeofficeTrend topic

When & Where

calendar_month

Wed, 10/11/2023, 09:15 - 09:30

location_on

Forum, Booth 7A-106

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

Zero Trust is a security model based on the assumption that any request coming from inside or outside the network is potentially dangerous. There is no "trust zone" and every access must be verified. There are several steps that organisations can take to implement a successful Zero Trust architecture. 

In the presentation, you will learn the seven steps with the "how" and "why" of each. With this information, you will be able to assess for yourself the diverse statements of the market to protect your business in a more secure, agile and cost-efficient way.

Moderator