Sandeep Kumbhat, Okta and Harpreet Singh, T-Mobile
Ludicrous Mode with Zero Trust: T-Mobile's SuperCharged Enterprise Access Journey
In the era of cloud computing and remote work, the network security perimeter is gradually disintegrating, and internal and external threats are intensifying, leading to the failure of the traditional perimeter-based security architecture, therefore the zero trust security architecture comes into being. This session would give an insight into Identity driven Zero Trust reference architecture and implementation artifacts around Zero Trust for Apps, APIs, Network and Infrastructure.