Главная
Study mode:
on
1
RSAConference 2019
2
Our industry loves marketing Buzzwords
3
So on to the history.
4
Yesterday's business
5
Today's business
6
Tomorrow's business
7
and our border?
8
Evolution of Information Security Technology
9
And this is how the business see us...
10
Right problem, wrong solution
11
What Zero Trust is not ...
12
What Zero Trust should be in your organization..
13
Zero Trust: Network
14
Zero Trust: Legacy
15
Zero Trust: Access Management
16
Zero Trust: Identity - CONTEXT is key
17
What strategies should I employ?
18
Zero Trust: Data
19
Get back to fundamentals
20
Summary
21
Easy wins...
22
Apply What You Have Learned Today
23
Free Resources & Further Reading
Description:
Explore the concept of "zero trust" in cybersecurity through this 44-minute RSA Conference talk. Separate fact from fiction as Paul Simmonds, CISO and CEO of Global Identity Foundation, dissects the marketing hype surrounding this buzzword. Gain insights into the practical realities of implementing a zero-trust architecture, understand its true meaning, and learn about the business benefits it can offer. Discover strategies for applying zero-trust principles to networks, legacy systems, access management, and data protection. Examine the evolution of information security technology and how it relates to changing business landscapes. Leave with actionable knowledge on fundamental security practices, easy wins, and resources for further learning about zero-trust architectures.

The Fallacy of the Zero-Trust Network

RSA Conference
Add to list