This is a hybrid event - you can attend virtually or on site.
A gold standard for cybersecurity has been elusive. Until now. Zero Trust developments have been fueled by the simple observation that fortifying networks does not protect data. Vendors, standards bodies, and regulators started to study this problem and independently came to the same conclusion. What began a decade ago as a conceptual model is now is a widely accepted methodology for minimizing uncertainty in enforcing accurate, least privilege, per-request access decisions in information systems and services based on verified account-level identity.Join Jennifer L. Bayuk, Ph.D., a cybersecurity due diligence expert, as she covers the following topics: