The Components of Zero Trust

Logo
Presented by

John Burke, CIO and Principal Research Analyst, Nemertes Research

About this talk

Shifting to a zero-trust model is imperative if your goal as a cybersecurity professional is to get away from the perimeter-based model. But: • What are the components of zero trust, and what does it take to implement them? • What should you do first, second, and third? • What are the must-have technologies and practices? This webinar provides a blueprint for cybersecurity professionals seeking to move from perimeter-based to zero-trust security.
Related topics:

More from this channel

Upcoming talks (14)
On-demand talks (248)
Subscribers (26908)
Nemertes is a research-based advisory and strategic consulting firm that analyzes the business value of emerging technologies. Since 2002, we have provided strategic, client-centric recommendations based on data-driven operational and business metrics to help organizations deliver successful technology transformation to employees and customers. Simply put: Nemertes’ better data helps clients make better decisions. Please note: Nemertes owns the copyright to all content in this channel. You may not use, post, print, or repurpose any of material without the express, written consent of Nemertes. You may retweet or share only that content that Nemertes posts on its social media sites.