Extending ZeroTrust to the Endpoint

Presented by

Sebastian Goodwin, Director of Product Marketing/IT Security Leader/Author, Palo Alto Networks

About this talk

With exploit kits readily available to attackers, even ‘good’ applications can go ‘bad’. Many endpoint security approaches begin by trusting everything, and monitoring for patterns or malicious behaviors, while others attempt to whitelist trusted applications and block the rest. The “Zero Trust Model” of information security coined by Forrester, has traditionally been applied to network communications, but today’s advanced cyber threats warrants a new approach in which the Zero Trust model is extended to endpoints. The same rigor must be applied on the endpoint; on the OS, on connected devices, and in memory. This is particularly important as most resources an attacker might be most interested in – data and applications – will live on the endpoint.  Join Palo Alto Networks as we examine how an organization can and should extend a “never trust, always verify” philosophy to their endpoint security.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13396)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more