Cloud Security: Adopt Zero Trust by Putting Asset-Level Safeguards in Place

The Keynote Theatre

Wed 17th Oct 01:00 to 01:30

Information systems security is intended to protect assets that matter – infrastructure, data, applications, and users. But network perimeters are permeable, and assets are increasingly distributed in the cloud. Today's challenge is to implement security policies and controls that are effective, consistent, and portable to wherever the assets are. John Summers will discuss how to take security to the next level with zero trust approaches that raise visibility, protect key assets, simplify network and infrastructure management, and enable fast-paced digital business.

What you will take away from this session

  • What a “Zero Trust” enterprise architecture is
  • What it takes to make the transition from legacy to Zero Trust
  • The business benefits of adopting this approach to security
  • Real world examples of companies who have made the transition and why they did so


Photo Speaker Name Profile
John Summers John Summers View Profile