As we transition from a remote to a fully mobile, hybrid workforce, organizations need to re-evaluate their approach to securing their people and data. Perimeter defense is no longer sufficient for achieving cyber resiliency and securing our information enterprise that spans geographic borders, interfaces and external partners, and support to millions of authorized users. The "never trust, always verify" mindset requires organizations to take responsibility for securing devices, applications, assets, and services. For an effective Zero Trust security model implementation, organization should answer the following:
Enabling Objectives:
Speakers:
Robbin Johnson, Senior Information System Security Engineer, National Security Agency
Jerri Sanders, Quality Assurance and Risk Manager
Stephen Yirenki, CEO, Terp Techs, LLC
Col. Elizabeth Casely, Director, I Corps Communications (G6)
Create your
podcast in
minutes
It is Free