Beyond the perimeter: Continuous monitoring with NIST's Zero Trust security model
Live on Sept 29 at 2 PM AEST | 2 PM GST | 2 PM EDT | 1 hr
This data-driven webinar focuses on:
How to overcome the challenges of a perimeter-based security model with Zero Trust.
Orchestrating a Zero Trust security framework established on access-based user provisioning, visibility, and governance.
The role of security analytics in monitoring a Zero Trust environment.
How Zero Trust supports Gartner's Continuous Adaptive Risk and Trust Assessment (CARTA) by continuously evaluating users and devices based on contextual access policies.
How you can incorporate this approach into your existing security framework.
Jay Reddy, Sr. Technical Evangelist.A sought after speaker on the latest IT trends in international conferences and seminars. Authored numerous e-books and research studies that help business leaders with insight and advice on leveraging the latest technology for better IAM and cybersecurity.