Why Zero Trust Network Access is not your silver bullet
- Where does Zero Trust fall short, and why these failings encourage cyber-crime
- Expanding Zero Trust to protect the data itself
- Identifying, classifying, and securing sensitive data through automation
Featuring:
Thom Langford, Host, teissTalk
Jean Carlos, VP Cyber Security, BOXT
Sasha Henry, Senior Managing Consultant, Cyxcel
Karim Eldefrawy, CTO and Cofounder, Confidencial
The fundamental principle underpinning Zero Trust requires all users within and outside an organisation’s network to be authenticated, authorised, and continuously validated.
Nonetheless, it is not a silver bullet by any means. Recent studies show that in the next three years, over 50% of all cyber threats will be focused in areas that Zero Trust principles cannot mitigate nor control.
In our next episode of teissTalk with Thom Langford, we’ll explore:
- Where does Zero Trust fall short, and why these failings encourage cyber-crime
- Expanding Zero Trust to protect the data itself
- Identifying, classifying, and securing sensitive data through automation
Join this episode to discover how cyber attackers are circumventing Zero Trust principles and how best to close those security gaps.
Please register or log-in to watch this on-demand episode
Featured SpeakersView All
Thom Langford
Jean Carlos
Sasha Henry
Karim Eldefrawy
When you register on our site you are automatically registered for all teissTalk episodes