Applying Zero Trust in a Hybrid Cloud Environment
Accelerated digital transformation has moved communication, business, and personal interactions online. But this has significantly increased potential attack surfaces, resulting in a dramatic surge in cybersecurity incidents and exposed records. As workloads move to the cloud, threats move with them. IBM's research indicates that in 2020, upwards of 90% of cyber-related incidents originated in cloud environments.

Organizations that are ahead in applying a zero trust approach to security - zero trust pacesetters - see improvements in all aspects of their security operations, including improved network visibility, breach detection, and vulnerability management.

Discussion topics will includes:

  • Practical steps to implement a zero trust framework
  • Use cases for zero trust and metrics of success


Join ISMG's Tony Morbin for a moderated discussion that will feature insight from Daina Proctor, Security Threat Management Associate Partner at IBM Canada.
Tony Morbin
Tony Morbin
Executive Editor

ISMG
Daina Proctor
Daina Proctor
Security Threat Management Associate Partner

IBM
Watch a brief video on the topic.
February 16, 2022 | 04:00 - 05:30 pm EST
Sponsored By
IBM

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @ IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

ISMG Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.

February 16, 2022 | 04:00 - 05:30 pm EST

Applying Zero Trust in a Hybrid Cloud Environment