Training

Governance & Risk Management , Security Operations , Zero Trust

Live Webinar: Zero Trust & the ID-Based Cybersecurity Perimeter

Live Webinar: Zero Trust & the ID-Based Cybersecurity Perimeter

A confluence of events is bringing the need for a new cybersecurity perimeter into clearer focus. The rapid adoption of "cloud first" strategies -across multiple cloud computing flavors (SaaS, PaaS, IaaS and more) - combined with the reality that "work from home" simply hastened employees need for access to apps and other IT resources from anywhere, requires a rethinking of the traditional security perimeter. It's not that network-based protection/detection controls are dead: they are simply inadequate in enabling a Zero Trust security approach.

Register & attend this webinar as we discuss:

  • The impact of cloud first
  • How organizations are adopting identity-base perimeters as a fundamental Zero Trust building block
  • The implications for Identity and Access Management tooling moving forward will be covered

Webinar Registration

Select a date to attend:
Register Now for FREE

Become a Premium Member

Unlimited Webinars + OnDemand Access

Join now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.