Zero Trust - Myths & Realization

Logo
Presented by

Ronald Pool

About this talk

The sudden need to facilitate home working this year as a result of COVID-19 meant the corporate network expanded to wherever the user is based. The immediate requirement of basic business continuity resulted in security in many instances coming second on the priority list. Now, as we continue to embrace the new normal that the pandemic has driven and remote working is our safest physical environment it is critical that organisations consider their cyber safety as users work and collaborate from home. How do we know the users logged into company accounts are who they claim to be when they are working from anywhere? A Zero Trust architecture approach could be the best way to facilitate the most effective security posture for your business right now.The fundamental concept of Zero Trust is “don’t trust anybody or anything operating inside or outside your network at any time.” That sounds very pragmatic, but what are the options in this vast playing field full of different definitions? The Bigger Picture The technologies that support Zero Trust are moving into the mainstream. Ronald Pool (cybersecurity specialist, CrowdStrike) will present his broad knowledge of Zero Trust Security during this webinar. He will share his views on the basis of current techniques and provide concrete examples and case studies throughout the session. Whether you are a rookie or an advanced Zero Trust expert, this webinar is a must-watch for anyone interested in this popular topic. Join to hear about: ●A firm understanding of Zero-Trust ●Components of a Zero Trust Architecture ●Practical tips
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (188)
Subscribers (32099)
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.