“Journey to Zero Trust” explores the shift in cybersecurity from traditional perimeter-based defenses to the Zero Trust model, which operates on the principle of “never trust, always verify.” It outlines the evolution of network security, underscores the role of micro-segmentation, Zero Trust Network Access (ZTNA), and Identity and Access Management (IAM) in modern cybersecurity strategies. The content guides through assessing readiness for Zero Trust, developing a strategic roadmap, and leveraging existing tools for implementation, aiming to enhance organizational security posture in the current dynamic IT environment.

 

May 30 @ 09:45
09:45 — 10:30 (45′)

Evgeniy Kharam