Why Zero Trust Network Access is not your silver bullet
- Where does Zero Trust fall short, and why these failings encourage cyber-crime
- Expanding Zero Trust to protect the data itself
- Identifying, classifying, and securing sensitive data through automation
Featuring:
Thom Langford, Host, teissTalk
Jean Carlos, VP of Information Security, AutogenAI
Eric Sanchez, CISO, Orrick, Herrington & Sutcliffe LLP
Sasha Henry, Senior Managing Consultant, Cyxcel
Karim Eldefrawy, CTO and Cofounder, Confidencial
The fundamental principle underpinning Zero Trust requires all users within and outside an organisation’s network to be authenticated, authorised, and continuously validated.
Nonetheless, it is not a silver bullet by any means. Recent studies show that in the next three years, over 50% of all cyber threats will be focused in areas that Zero Trust principles cannot mitigate nor control.
In our next episode of teissTalk with Thom Langford, we’ll explore:
- Where does Zero Trust fall short, and why these failings encourage cyber-crime
- Expanding Zero Trust to protect the data itself
- Identifying, classifying, and securing sensitive data through automation
Join this episode to discover how cyber attackers are circumventing Zero Trust principles and how best to close those security gaps.
Featured SpeakersView All
Thom Langford
Jean Carlos
Eric Sanchez
Sasha Henry
Karim Eldefrawy
When you register on our site you are automatically registered for all teissTalk episodes