Training

Events

Plenary: Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach

Plenary: Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach

Where does the journey to “zero trust” begin and what are the common entry points for accessing data? Experts agree that “zero trust” is based on the “assume breach” premise that treats every asset as breached and all traffic as hostile.

See Also: Live Webinar | Navigating the Difficulties of Patching OT

The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?

This session will cover:

  • How has the approach toward security changed as security perimeters disappear?
  • How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment?

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.