The term “Zero Trust” has been making the rounds since Forrester coined it as a new way to think about our security architecture. Several leading companies have published papers about this concept, including Google’s BeyondCorp. The premise is that we should not trust anything inside or outside our networks and verify everything and anything trying to connect to the networks. So, what does “Zero Trust” really mean to our organizations? In addition to identity-based zero trust there is a role for other security pillars, including network security – think network segmentation and network access control (NAC). Can zero trust be practically implemented? In this series, we will explore ways that members can realistically implement a Zero Trust model to better protect their data and assets.
Topics likely to be discussed in this series include:
----------------------------------------
NOTE: CISO attendees are eligible to earn 4 CPE credit hours from our Breakfast Roundtables. Registrants must be present to claim their credit hours.