Overview
Zero Trust and Combating Risky User Behavior

Is Zero Trust the new ‘Holy Grail’ for keeping our users safe and our environments secure? What does a successful Zero Trust implementation include and what are its success metrics?

Security Controls Covered: IAM, UEBA, Awareness Training, Email Security, Micro-segmentation, and Endpoint Security

The term Zero Trust has been around for quite some time and most of you have implemented elements of the model over the years. With the pandemic and the move to a more remote workforce Zero Trust has emerged as a method to implement greater security discipline in our organizations. Based on member feedback in the last year it appears that Zero Trust has moved to the front burner and members want to understand practical ways to achieve it. In this series we will look at pragmatic approaches to implementing a Zero Trust model and also discuss wins that members have had from putting the model in place.

When you register for this event, you are agreeing to our privacy policy. Learn more here: https://www.cisoexecnet.com/privacy-policy

We may also provide contact information in connection with our meetings to exhibitors and sponsors of these meetings. The use of this information is limited to contact in connection with such meetings. By registering for the event you agree to opt in for the sharing of this contact data.

Sponsored by IBM Security, Okta, & Code42