Governance & Risk Management , Zero Trust

Zero Trust and the Critical Role for Strong Authentication

Exclusive Panel From the ISMG Identity & Access Management Virtual Cybersecurity Summit
CyberEdBoard Executive Members, Bernardo Vasquez and Rob Hornbuckle

Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting to your network and that these privileges can be expanded or retracted as needed.

See Also: Isolated Castles: Incident Response in the New Work From Home Economy

Join this panel of experts to explore the following topics:

  • Where do you begin to assess where you are on your Zero Trust journey?
  • What is strong authentication and why is it a critical part of Zero Trust?
  • How can I ensure that my authentication is dynamic enough to meet the changing workforce and expanding attack surface?

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.