Dated Zero Trust in 2020? Make a Commitment in 2021!

Logo
Presented by

James Carder and David Holmes

About this talk

Ever since Forrester alum John Kindervag founded the concept of Zero Trust in 2009 , it’s intrigued those with its “Never trust, always verify” approach to security. Even so, many believed the framework to be out of their reach, often citing high costs or labor requirements as a barrier to entry. High-profile implementations of Zero Trust by companies like Google and Beyond Corp have helped the cybersecurity industry realize its feasibility ; however, most organizations have still taken an exploratory approach to Zero Trust — that is, until COVID-19 forced companies to stand up remote workforces practically overnight. The sudden pressure to keep employees and assets both connected and secure resulted in a paradigm shift for how IT and security teams operate — and a spike in interest and adoption of Zero Trust as a security strategy. But the circumstances leading to this meant that most organizations didn’t already have a roadmap to guide a holistic implementation, so many scrambled to apply bits and pieces of Zero Trust and are now wondering how to take the next step with the framework. Guest speaker, Forrester senior analyst David Holmes and LogRhythm CSO James Carder are here to help. During this session, they’ll discuss: • How the security community can directly translate Zero Trust components into concrete roadmap items • How security elements like automation and visibility tie into the framework • Examples of each based on Forrester research You will also hear from James about his own successful implementation of Zero Trust at LogRhythm. Learn how to solidify your Zero Trust strategy so you can realize the benefits of a full implementation.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (257)
Subscribers (76717)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com