InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Integrating Zero Trust in a Scalable Enterprise Architecture

Presented by

Yeghisabet Alaverdyan, Head of Systems Integration | EKENG CJSC

About this talk

In the midst of rapidly advancing technological progress, the rise of digitization and remote work has become a prevailing trend. As a result, critical infrastructures are increasingly susceptible to new risks, continually expanding the realm of cybersecurity threats and attack methods. Consequently, organizations are more inclined to entertain the notion of paying ransoms to threat actors. It is imperative for organizations to remain vigilant against these emerging threats to safeguard their systems. The recent proliferation of artificial intelligence (AI) technology has given rise to AI-powered cyber-attacks, which are experiencing exponential growth. This development has facilitated cybercriminals in creating sophisticated and innovative malware embedded with new zero-day vulnerabilities. AI-powered cyber-attacks leverage machine learning to adapt to evolving defenses and devise novel methods to circumvent them, all while remaining undetected. This enables them to establish an illicit, enduring presence within networks for the purpose of extracting highly sensitive data. In order to effectively counter advanced cyber-attacks, organizations must adopt a comprehensive approach and incorporate zero trust principles into their architecture. This involves: - Treating every device, node, or entity as a potential threat point. - Implementing explicit identification, authentication, and authorization measures. - Embracing a default deny model as opposed to a default access model. - Developing proactive incident response plans. - Providing cybersecurity best practices training for employees. - Deploying AI-powered cybersecurity solutions. We invite you to engage in thoughtful discourse on these topics, cultivating a clear understanding and exploring strategies for integrating zero trust into your scalable enterprise architecture.
Enterprise Architecture

Enterprise Architecture

72486 subscribers410 talks
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.
Related topics