InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Put Zero Trust in Your Devices

Presented by

Steve Mancini, CISO and Ryan Clarke, Principal Security Scientist, Eclypsium

About this talk

The recent shift to a remote work environment has created new challenges for many businesses and government institutions with profound impacts on organizational security models. Suddenly, many users are no longer protected by the many layers of security found on-premise in the corporate network. Instead, security policies must evolve to support a new reality where users are remote by default and massive amounts of untrusted, inbound connections are the norm. Incorporating security concepts like Zero Trust can be a critical part of securing these remote work environments, which often include a mix of corporate laptops, BYOD devices, and home networking gear. If the integrity of these devices isn’t assured, then it is impossible to assure the safety of the operating systems and other software running on them. Yet for many organizations, device integrity remains a blindspot where Zero Trust principles are not yet applied, and as a result, security is assumed instead of verified. In this webinar, Steve Mancini, CISO of Eclypsium, and Ryan Clarke, Principal Security Scientist at Eclypsium will discuss: Device Integrity and Zero Trust Identifying Device Level Vulnerabilities Looking for Signs of Compromise Secure Access for Remote Workers Device Best Practices for Zero Trust
Eclypsium Cybersecurity

Eclypsium Cybersecurity

3877 subscribers50 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics