The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
Zero Trust is revolutionizing network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure. In this session, John will discuss the concept of Zero Trust and explains why Zero Trust is the world's only true cybersecurity strategy. In 2020, President Biden issued an Executive Order mandating that all US Federal Goverment Agencies move towards adopting Zero Trust.
Zero Trust is both strategically resonant to the highest levels of the business, but also practically and tactically implementable using commercial off-the-shelf technologies. Because Zero Trust focus on providing granular protections around sensitive assets, this architectural model - which designs the network from the inside out - is perfectly positioned to solve the security challenges of modern critical infrastructure and IOT networks. For example, Zero Trust networks protect East-West traffic by default by enforcing micro-perimeters around critical assets or data. Therefore, internal malware propagation is stopped automatically. Zero Trust innovations also add a layer of agility to modern networks that is impossible to achieve in traditional network designs. This means that your network can respond to the speed of business. These 21st century networks have been adopted by large enterprises and government entities around the world. John will explain how a Zero Trust Network Strategy will achieve tactical and operational goals that make security organizations a business enabler, not a business inhibitor.
Key Takeaways
Zero Trust is the world’s only real cybersecurity strategy
Zero Trust has Business Value and resonates to the highest levels of your business
Zero Trust is Implementable Using Commercial Off the Shelf Technology
Zero Trust is not risky. It augments the existing networks and enables a smooth transition from a legacy network to a Zero Trust network over time
Speaker(s):
John
Kindervag,
Senior Vice President, Cybersecurity Strategy,
ON2IT Group Fellow
You must be logged in and own this session in order to
post comments.