Zero Trust: The DNA of Data Security
According to a 2021 survey, over 50% of organizations use over 25 systems to manage identities, and
21% use over 100. Despite such preventative measures, a user falls victim to identity theft every two
seconds. With cloud permeating the boundaries of the enterprise, the surface for compromised or
stolen credentials of privileged users and applications has exploded. Zero trust - a vital architectural
shift in security - fills the gap left by old perimeter-based, defense-in-depth models.
Gartner predicts that while 60% of organizations will embrace zero trust as a starting point for
security by 2025, 50% will fail to realize its benefits as replacing implicit trust with identity and
context-based trust could be complex and tricky.
• How can you create a winning zero trust network access (ZTNA) model?
• Do you fully understand the zero trust model and the changes required to implement it?
• What is your long-term vision with zero trust?
Join us for this exclusive executive roundtable where we intend to discuss how a well-implemented
zero trust architecture can address issues like ransomware attacks, data exfiltration, on-premises
and cloud application security and more.
Discussion topics will include:
- Know-how on context-based, identity-centric approach
- How do you extend the Zero trust ecosystem to your partners & contractors when you have no control of their endpoints
- BeyondCorp - a fascinating story of Google’s tryst with zero trust