The Skeptic and the Data: How to Bring Trust to Zero Trust

Logo
Presented by

Wolfgang Goerlich, Advisory CISO, and Sandy Hawke, Zero Trust Product Marketer

About this talk

Like with most cybersecurity trends, zero trust has inspired a lot of skepticism – especially for practitioners on the front lines. Is this skepticism warranted? How can we prove the value of zero trust to convert the harshest critics into true believers? Where’s the data? While many CISOs appreciate zero trust because it finally brings urgency for and clarity to their initiatives, this is not the case for everyone in the infosec community. Practitioners responsible for implementing zero trust security controls are some of the biggest skeptics when it comes to measuring the value of zero trust use cases and capabilities. In order to make progress towards zero trust security, it’s critical to get everyone on board – from the most passionate executive to the most cynical security analyst. Listen to our experts talk through these challenges and how to gain consensus, referencing field data from more than 5,000 professionals whose organizations are embarking on zero trust.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (102)
Subscribers (20216)
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.