Zero Trust Architected Networks
Assume breach. It might be one of the most memorable pieces of cyber risk advice following the December 2020 discovery of an ongoing supply chain attack by a sophisticated threat actor, likely Russian in origin. If you are running these software versions, assume breach and hunt for adversarial behavior. Full stop. From the Security Teams to Chief Information Security Officers, we know that the worries and concerns of significant business disruption from a cyberattack are on the minds of many. But there is a better way for organizations to manage security. That approach is zero trust.
While the concepts of zero trust are not new, shifting away from trusted, firewalled, or castled networks is unknown to most enterprises. Many organizations are struggling to integrate these concepts in an information technology modernization strategy focused on security. Zero trust architectures assume that malicious actors are both within and outside the enterprise and that security teams need to validate the connections between every user, device, application, and dataset. In addition, organizations will migrate operations to the cloud and employ automated endpoint detection and response (EDR) capabilities. Cloud migration increases employee productivity by allowing secure connections from anywhere, from any device, while EDR technologies reduce potential business disruption by accelerating detection and response to threats.
In this panel discussion, our experts will talk about strategies to expedite the adoption of zero-trust architectures. While they will not cover the waterfront, panelists will focus on the highest value starting points for organizations to mature their zero-trust architecture (ZTA) maturity. The conversation will focus on identity, devices, networks, applications, and data as the foundational pillars of ZTA.
Return to the WATCH LIVE tab on the day of the event to view the program.
Tuesday, September 28, 2021
1 PM - 2 PM ET