Zero-Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start?
In this session we'll focus on:
-The full Zero Trust reference architecture
-The steps required to adopt a zero-trust model
-Why Identity is the foundational layer from which to build contextual access controls