Plenary: Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach
Where does the journey to “zero trust” begin and what are the common entry points for accessing data? Experts agree that “zero trust” is based on the “assume breach” premise that treats every asset as breached and all traffic as hostile.
See Also: How to Take the Complexity Out of Cybersecurity
The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?
This session will cover:
- How has the approach toward security changed as security perimeters disappear?
- How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment?