Zero Trust: The Good, the Bad and the Gamechanging

Presented by

Jack Poller - Senior Analyst, ESG and Wolfgang Goerlich, Advisory CISO at Cisco Duo Security

About this talk

Zero Trust is being lauded as the new paradigm for security architecture, but in some circles it is getting the same bad rap as ‘cloud washing’. With ESG research showing that a little more than 40% of organizations have received both security and business benefits from adopting Zero Trust - including a reduction in the number of incidents and data breaches, improved SOC efficiency and simplified compliance - it’s time to dive into how businesses can ensure that their Zero Trust adoption is a success. In this webinar, Jack Poller, Senior Analyst at ESG and Wolfgang Goerlich, Advisory CISO at Cisco Duo Security, are sharing exactly how businesses can do just that. Join them to hear them discuss: - The good and the bad outcomes Zero Trust adoption can lead to - and how to ensure your adoption doesn’t fall into the latter camp - Why it’s essential that before you establish trust, you authenticate identity - Recent changes that can help businesses strengthen authentication - How Machine Learning is being used to surface risk in the authentication and authorization process - How a Zero Trust Center of Excellence can help you see success, quicker - And more

Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (17)
Subscribers (3026)
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.