Best Practices for a Zero Trust Approach to Cybersecurity



Old-school perimeter-based security relies on separating the "bad guys" from the "good guys." Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify.”


Join us to learn best practices on how organizations will continue implementing Zero Trust architectures. While Zero Trust is a strong approach to addressing modern cybersecurity threats, you will need technology, process, and people to implement necessary controls. You need to secure devices and identities without disrupting everyday operations. In this webinar we will share how to:

  • Verify every user. Strong, context-aware, multi-factor authentication mitigates the risk of stolen passwords.
  • Validate every device. Only allow registered devices with good security posture to access resources.
  • Leave no endpoint unprotected. Keep your endpoints secure - from servers to workstations to remote devices.

Speaker and Presenter Information

Sandra Jontz - Vice President of Communications and Chief Knowledge Officer, Associate Publisher
AFCEA International/SIGNAL Magazine

 

Jeremy Newberry - Cybersecurity Solutions Architect
Merlin Cyber

 

Gram Slingbaum - Solutions Engineer
CyberArk

Relevant Government Agencies

Intelligence Agencies, DOD & Military, Other Federal Agencies, Federal Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Sep 22, 2021, 1:00pm - 2:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

Merlin Cyber


Organizer
AFCEA International | Signal Webinar Series


Contact Event Organizer



Return to search results