Zero Trust in a Post-COVID World

Presented by

Corey Williams and Todd Moseley

About this talk

Even as the pandemic eases, the changes it has wrought will last. Your people, employees, faculty, staff, and students won't be 100% back on-site. Identity is your new perimeter. Old-school perimeter-based security relies on separating the "bad guys" from the "good guys". Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify". Join this webinar to learn best practices on how organizations will continue implementing Zero Trust architectures in the nearing "post-COVID" world. While Zero Trust is a strong approach to addressing modern cybersecurity threats, you will need technology, process, and people to implement necessary controls. You need to secure devices and identities without disrupting everyday operations. In this webinar, CyberArk will share how to: • Verify every user. Strong, context-aware, multi-factor authentication mitigates the risk of stolen passwords. • Validate every device. Only allow registered devices with good security posture to access resources. • Leave no endpoint unprotected. Keep your endpoints secure - from servers to workstations to remote devices.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (66)
Subscribers (5167)
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!