InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Top 5 Zero Trust Practices to Stop Modern Attacks

Presented by

Kapil Raina, VP Zero Trust Marketing, CrowdStrike

About this talk

Modern attacks like ransomware and supply chain attacks can start from anywhere in the kill chain – endpoints, identities or cloud workloads. Zero Trust, if deployed correctly, can be the answer to increasing real-time security coverage and reducing the attack surface in the hybrid enterprise. However, with the rapidly evolving adversarial tactics and techniques behind modern attacks, organizations need to not only operationalize Zero Trust, but to do so with minimal disruption to business operations and complete integration with existing systems. Join us to learn more about the top five Zero Trust best practices CISOs use to detect and stop modern attacks like ransomware and supply chain breaches in real time.
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80428 subscribers1015 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics