What Is Zero Trust? The Role Of Continuously Assessing Device And Identity Health with Eric Wing
From Laurel Belman
The world is changing, and our traditional security models have failed to keep up. The Zero Trust model is unique because it requires verification of everyone either inside or outside your network, removing that network edge mentality from your security landscape. In this session we will discuss the reasoning behind the Zero Trust model, the value it provides, and how it should be incorporated into security design.
- Understand why traditional security models do not meet today’s security requirements
- Gain knowledge about the Zero Trust security model and why continuously assessing device and identity health is needed
- Learn to redesign their current security model with Zero Trust