The First Step to Zero Trust: Cybersecurity Asset Management

Logo
Presented by

Ron Eddings, Creative Director of Education, Axonius; Brandon Dunlap, Moderator

About this talk

“How can we implement a zero trust strategy?” is a question asked by nearly every security team that wants to avoid increasing their attack surface and being the victim of a high-profile breach. A zero trust strategy is rooted in the principle of “never trust, always verify” — which minimizes risk by securing sensitive data, systems, and services. However, all too often security teams discover that they don't have the visibility they need to do this. The first step to implementing a zero trust strategy and achieving exceptional security hygiene? Building and maintaining an inventory of your critical assets. Please join Axonius and (ISC)² on August 23 at 1:00pm Eastern/10:00 a.m. Pacific as we share how teams can approach zero trust principles and how keeping an asset inventory can help answer the toughest zero trust questions: What device is trying to access corporate assets? What vulnerabilities exist on my applications and services? Which users have access to critical resources? Is my zero trust application managed or unmanaged?
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (446)
Subscribers (139058)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.