Architecting Zero Trust With a Data First Approach
Cybersecurity providers must constantly adapt and evolve with the variety of ways in which the blast radius of attacks has been expanding. Organizations have built their security strategy around the concept of 'zero trust,' which departs from the conventional perimeter and asset-centric protection models. Where does the journey to 'zero trust' begin, what are the typical entry points, and how can it unfold? Truly reaping the benefits of a 'zero trust' strategy requires a complete and robust understanding of an organization's data landscape and establishing a practical data access governance framework. Without this, many of the benefits of 'zero trust' are lost, rendering it more of a diluted version of conventional models.
The session will cover:
- How to architect a data-first approach towards 'zero trust' involving its core elements
- Assess the maturing of 'zero trust' state with a realistic look at security
- Using 'zero trust' to secure the future work environment