InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Zero Trust Architectures

Presented by

Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext

About this talk

Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters. What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities? In this BrightTalk you will learn about: 1. Key ways that Zero Trust can simplify infosec implementation. 2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners. 3. How inherent trust is the root of most pervasive issues facing IT today. 4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives • How zero trust facilitates a secure work from home world • The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
Towerwall

Towerwall

2199 subscribers46 talks
Information Security
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.
Related topics