Zero Trust Access: The Five Step Program

Logo
Presented by

Zoe Lindsey, Security Strategist, Duo Security

About this talk

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The Zero-Trust Access model delivers security without cumbersome and antiquated technologies. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (46)
Subscribers (2531)
Trace3 is an elite technology consultancy that provides IT strategy, solutions, and services to the world’s most admired companies, and empowers organizations to embrace the ever-changing IT landscape.