Win The Cyberwar With Zero Trust
The Keynote Theatre
Wed 18th Oct 16:30 to 16:55
Zero Trust is revolutionizing network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure. In this session, John will discuss the concept of Zero Trust and explains why Zero Trust is the world's only true cybersecurity strategy. It has been both adopted and advocated by Google and it has been called out and its adoption encouraged by the United States House of Representatives as a result of their OPM data breach investigation.
Zero Trust is both strategically resonant to the highest levels of the business, but also practically and tactically implementable using commercial off-the-shelf technologies. Because Zero Trust focus on providing granular protections around sensitive assets, this architectural model - which designs the network from the inside out - is perfectly positioned to solve the security challenges of modern critical infrastructure and IOT networks. For example, Zero Trust networks protect East-West traffic by default by enforcing micro-perimeters around critical assets or data. Therefore, internal malware propagation is stopped automatically. Zero Trust innovations also add a layer of agility to modern networks that is impossible to achieve in traditional network designs. This means that your network can respond to the speed of business. These 21st century networks have been adopted by large enterprises and government entities around the world. John will explain how a Zero Trust Network Strategy will achieve tactical and operational goals that make security organizations a business enabler, not a business inhibitor.
What you will take away from this session
- Zero Trust is the world’s only real cybersecurity strategy
- Zero Trust has Business Value and resonates to the highest levels of your business
- Zero Trust is Implementable Using Commercial Off the Shelf Technology
- Zero Trust is not risky. It augments the existing networks and enables a smooth transition from a legacy network to a Zero Trust network over time