The Zero Trust Framework Applies to Endpoints Too

Logo
Presented by

Charles Kolodgy, Adjunct Professor, Rivier University

About this talk

The zero trust concept has been around for over a dozen years. For a long time it was just an aspiration for companies, but over the past few years it has become a reality. According to a number of surveys, a majority of organizations are working on zero trust projects. While zero trust is primarily regarded as a network security framework, the tenets of zero trust are applicable to all elements of the cyber security stack. This presentation will discuss why and how zero trust can be implemented at the device level. Attending the webinar will provide you with: o A deep understanding of the components of zero trust; o How a zero trust mindset fosters the development of a zero trust architecture; o The added value of including endpoints into this security framework; o The knowledge required to advocate for the incorporation of a zero trust architecture throughout the security stack.
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (708)
Subscribers (199093)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.