A Zero-Trust Approach

Remote Workforce

12-10-2020

A Zero-Trust Approach

Remote Workforce

12-10-2020


The growth of insecure or unknown devices attaching to the network, along with the current climate of Covid-19 remote workers, is making it harder to distinguish between internal trusted users and external unknown untrusted users. Because networks now have numerous “edges,” it’s more difficult to create a single defensible boundary, rendering perimeter-based access control strategies ineffective. Consequently, businesses have had to rethink their current security strategy and adopt a zero-trust approach to network access with proactive protection. Now more then ever, organizations need to ensure that their networks are secure from the latest threats.

One Click Access to

CXOstories

Scott Augenbaum

Moderator:

Scott Augenbaum

Retired FBI Cyber Division Supervisory Special Agent

Share Webinar:

Fireside with


 Bryan Seely

Bryan Seely

Famous cyber security expert, ethical hacker & author

Insights by


Jonathan Nguyen

Jonathan Nguyen

VP, Global Field CISO Team

Fortinet

Michael McGlynn

Michael McGlynn

VP, Security Solutions

World Wide Technology

Made Possible by

Interested in similar Webinars?

Here are some related Webinars based on the Audience


UP