Trust No One & Suspect Everyone: Zero Trust Security Model

  • Date 05 Jun 2019

Trust No One & Suspect Everyone: Zero Trust Security Model

05 Jun 2019, 10:30 - 11:15

Insight Stage
Language:
English

Identity & Access Management

A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent errors is simply becoming harder to control. Do you really know who has access to which data within your company network or what privileges they have access to? Defining who should have access to what is a vital part of any identity project—with zero trust, no one is trusted as it is assumed the bad guys could already be inside your network perimeter. With the growing scale of data breaches and high value of customer data, are you ready for zero trust adoption?

Learning Outcomes:

  1. Learn the differences between a zero trust network and zero trust identity and understand the mind shift for mainstream adoption
  2. Understand cybersecurity in the new era of remote working and the importance of moving from the management of devices to the management of the user
  3. Learn how moving towards a dynamic identity model reduces risk, improves compliance, and increases customer satisfaction
  4. Learn about the human element and how zero-trust networks can improve security while also increasing productivity
  5. Learn how to introduce the concept of zero trust to customers and why it’s vital they understand how users are behaving, what resources they are accessing and why, and the importance of preventing them from accessing systems they don’t need for their role

 

Contributors

  • Tim Brown

    Speaker

    Vice President of Security

    SolarWinds

      Tim is the VP of Security for SolarWinds with responsibility spanning product security and security strategy. He is a former Dell Fellow and CTO,...

Business Issues covered

  1. What will this session help you to do?
    • Deliver security to drive and enable business growth‎
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Solarwinds

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.