How to manage access control with Zero Trust

Logo
Presented by

Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism

About this talk

A perspective from the AT&T Cybersecurity and the AT&T Chief Security Office (CSO) Alongside NIST CSF, Zero Trust (ZT) principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Access control has always been a part of ZT, however in 2019 Forrester formalized the requirement to “limit and strictly enforce access control” into a core, critical pillar of the framework — of equal importance to network security. Controlling and maintaining access to the business without disrupting operations has reached a new level of importance. Especially now that businesses are dealing with the needs of a sudden, remote workforce and increasingly embrace mobile, cloud, and edge computing. Join us in a conversation with the AT&T Chief Security Office (CSO) as we discuss its current point of view on how to manage access control using ZT principals, including best practices. In this webinar, we’ll discuss: -What steps you can take to help improve access control and move closer to a ZT environment -Why network segmentation and virtualization are so important -How to use automation and orchestration for managing and dynamically enforcing access -Why you should define security policy by network components (versus IP addresses) and how to extend multi-factor authentication Meet Your Hosts: Tawnya Lancaster Lead Product Marketing Manager, AT&T Cybersecurity Steve Sekiguchi Director, Cybersecurity for AT&T Chief Security Office (CSO) Rich Bowman Lead Member of Technical Staff for CSO
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (36)
Subscribers (74840)
Welcome to LevelBlue (formerly AT&T Cybersecurity). We simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research. Our team is a seamless extension of yours, providing transparency and visibility into security posture and continuously working to strengthen it. We harness security data from numerous sources and enrich it with artificial intelligence to deliver real-time threat intelligence. This enables more accurate and precise decision making. With a large, always-on global presence, LevelBlue sets the standard for cybersecurity today and tomorrow. We easily and effectively manage risk, so you can focus on your business. LevelBlue. Cybersecurity. Simplified.