Zero Trust: The Need for Micro-Segmentation

Presented by

Aaron Bugal, Global Solutions Engineer. Sophos

About this talk

The challenges facing enterprises now is how to advance the pace of innovation and embrace the latest security methodologies, as the business demands grow. How can you meet the business objectives by aligning your security strategy with a 'zero trust' model and how important the element of micro-segmentation is to provide secure access? This session will cover: - How organisations can take a 'zero trust' approach. - How can 'zero trust' create process-level visibility? - How has micro-segmentation helped in the COVID-19 environment? Aaron Bugal has been with Sophos for over 12 years, moving to his current position as Global Solutions Engineer in 2017. Based in Melbourne, the majority of his time is spent helping organisations throughout Asia Pacific and Japan effectively deploy and use Sophos’ gateway, endpoint, network, and encryption systems. Aaron’s expertise enables him to flawlessly articulate to customers and partners the threats in today’s cybersecurity landscape, and how best to defend against them. It also sends him internationally - Aaron is a sought-after public speaker regularly providing guidance to business owners, CXOs, CSOs, and security professionals on how to keep their organisations secure.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (377)
Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.