To Trust or Zero Trust – What is the best approach?

Logo
Presented by

Joseph Carson, Chief Security Scientist, Thycotic

About this talk

Zero trust assumes any user or system that accesses the network, services, applications, data, or systems starts with zero trust basically meaning no access to anything. To gain authorized access, trust must be earned by the prospective user through verification and security controls. The Principle of Least privilege which helps enforce a Zero Trust approach is intended to prevent “over-privileged access” by users, applications or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk. It may help to think of least privilege by its other name - least authority - as it provides only enough authority for an entity to complete the job at hand. The least privilege model can also help curtail costs and increase efficiency. Join this webinar to understand how to maximize the benefits of least privilege, and learn just how much “privileged access” is too much. Join Thycotic’s Chief Security Scientist Joseph Carson and learn more about: • The Principle of Least Privilege • Realities of the Zero Trust Model • Best practices to get back in control
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198882)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.