Zero Trust and Identity as a Service

Logo
Presented by

Nya Alison Murray, CEO, Trac-Car Technology

About this talk

As the threat landscape and cybersecurity risks are an ever present threat in 2020, it is clear that measures have to be taken to be more mindful of what end users, people, applications and IOT device connections we allow through the virtual network defences into the platform and software services. As malware continues to evolve, accidental misconfigurations grow with application complexity, and new forms of operations hacking emerge, and the top three attack vectors were Phishing (31 percent), Scan and Exploit (30 percent) and Stolen Credentials (source IBM X-Force), it is clear that Identity Management and Access Control require attention to ensure they effectively protect data centre resources. It is clearly time for a new approach to identity services allowing or denying access, particularly for insecure network connections.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (901)
Subscribers (65598)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa