While Zero Trust has become an industry slogan among security advocates, it also has been diluted by being associated with specific solutions and technologies.
Let’s move beyond the buzzword and the diatribe of repeated messages that fall short in providing a clear and concise path forward. For security practitioners who strongly advocate for Zero Trust, we are going to provide practical and actionable steps on your journey to implementing Zero Trust practices within your environment and realising value for your organization.
During this roundtable, we’ll discuss:
• Why identity is the control plane and the first steps to establishing Zero Trust Network Access
• How identity plays a role across the Zero Trust CISA pillars — identity, devices, networks, applications & workloads, and data
• How your identity maturity can support your Zero Trust goals and beyond Central for Zero Standing Privilege and Least Privilege