Zero Trust and Digital Sovereignty: Real solutions for real challenges

Implementation of Zero Trust for more digital sovereignty and secure supply chains, taking into account risk management.

Topic

Data security / DLP / Know-how protectionEndpoint ProtectionMobile SecurityNetwork Security / Patch ManagementWebsecurity / VPNTrend topic

When & Where

calendar_month

Wed, 10/23/2024, 13:00 - 13:15

location_on

Forum, Booth 9-443

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

How do you use IT if you don't trust anyone - i.e. take zero trust seriously. You have to define chains of trust. This includes our own and external personnel, suppliers, subcontractors, service providers and all ICT components. 
Consequently, there are fewer trustworthy chains of action/processes and a core of particularly sensitive activities. However, every ICT component always has the purpose of processing data or establishing communication relationships for data transmission. The process and the people involved should also be trustworthy “enough” if they have access to the plain text information. So what is trustworthy “enough” for which data? The human resources department e.g. B. works with sensitive data that is subject to regulations, but sho ...

Moderator