Governance & Risk Management , Zero Trust

CyberEdBoard Executive Member, Sujeet Bambawale, guest speaks on panel at ISMG Zero Trust Virtual Cybersecurity Summit

Why network visibility is critical to getting Zero Trust right?
CyberEdBoard Executive Member, Sujeet Bambawale, guest speaks on panel at ISMG Zero Trust Virtual Cybersecurity Summit
  • Zero Trust is about implementing the right policies for ZT access. How do you get the policies right so that they are tight enough to be meaningful and yet not break the network?
  • Once Zero Trust policies are implemented, how do you monitor for moves/adds/changes so that the policies are can adjusted based on changing application, network and user patterns
  • Zero Trust won't prevent breaches, though it will make it harder and help contain the impact. What do you need to do beyond ZT to actively monitor for threat activity?

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.