
Yet Another Zero Trust Talk: It's not a technology, it's a mindset
Zero Trust Tool: Purchased and therefore safe? Certainly not!
Topic
Identity and access managementTrend topic
When & Where
Details
Format:
Management lecture
Session description
Perimeter security has been discussed for 20 years, sometimes controversially. A few years later, it has evolved into the "Zero Trust" principle as a model for a comprehensive security strategy. In the meantime, security experts agree that the implementation of Zero Trust is essential for ensuring cyber security.
Nearly every technology vendor in the cyber security space adorns its product with a "Zero Trust" label. At the same time, many security-conscious companies have already implemented their first "Zero Trust" products. "Zero Trust" seems to be ubiquitous. But although most companies have "Zero Trust" on their agenda, almost all lack a comprehensive strategy or a concrete implementation plan.
In this presentation, we will give you new food fo ...
Nearly every technology vendor in the cyber security space adorns its product with a "Zero Trust" label. At the same time, many security-conscious companies have already implemented their first "Zero Trust" products. "Zero Trust" seems to be ubiquitous. But although most companies have "Zero Trust" on their agenda, almost all lack a comprehensive strategy or a concrete implementation plan.
In this presentation, we will give you new food fo ...
Moderator
