Countering the Attack: How Zero Trust is Pushing Back Against New Cyberthreats

Presented by

Morey Haber, Chief Security Officer, BeyondTrust

About this talk

With the dramatic increase in the occurrence of sophisticated and high-profile cyberattacks evidencing an evolving threatscape that is both sprawling beyond its former perimeters and leading to the emergence of new, malicious threat tactics, the push to revamp cybersecurity processes and re-focus security beyond the perimeter has become imperative. In their Special Publication, 800-207, Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter, and to Zero Trust as the best security architecture for meeting the requirements of hybrid, cloud, and often multi-cloud network infrastructures. NIST characterizes Zero Trust as an evolving collection of cybersecurity paradigms and concepts that allow security defenses to shift from functioning as static, network-based perimeters to functioning as parameterless defenses that work to continuously authenticate and verify users, devices, and applications. Guided by the two core mantras of “Assume breach” and “Never trust, always verify”, and built on a foundation of cybersecurity paradigms that include enforcing continuous authentication, eliminating persistent trust, implementing the least privilege, enforcing segmentation and microsegmentation, and ensuring visibility, Zero Trust can help organizations reduce the attack surface, prevent unauthorized access to data and services, and control the impact threshold of any threat that does present itself to the network. Join this session with BeyondTrust's Chief Security Officer, Morey Haber to learn: • Why Zero Trust is more than a buzzword when it comes to preventing a cyberattack • What organizations need to know to distinguish Zero Trust as a concept from a functional Zero Trust Architecture • How to build a strategic and achievable pathway to Zero Trust

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (50)
Subscribers (4892)
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit