Zero Trust cybersecurity is an approach to security that assumes that every user and device accessing an organization's network or resources, including those within the organization's network perimeter, should be treated as a potential threat. In a zero-trust model, access to resources is not automatically granted based on a user's location or the fact that they are already within the network. Instead, access must be explicitly granted, authenticated, and authorized per session based on the user's identity, device, context, and behavior. Zero Trust also emphasizes the principle of least privilege, ensuring that users only have access to the resources needed to perform their jobs and nothing more.
Zero Trust is vital because traditional perimeter-based security approaches are no longer effective in today's increasingly complex and distributed IT environments. With the rise of cloud computing, mobile devices, and the Internet of Things (IoT), the network perimeter has become increasingly porous, and the number of potential attack surfaces has multiplied. Organizations can no longer rely solely on firewalls and other perimeter defense to protect their assets. Instead, they need a more holistic approach to security that focuses on protecting their data and resources wherever they may be, assuming that no user or device can be trusted implicitly. By implementing a Zero Trust model, organizations can improve their security posture, reduce the risk of data breaches and cyber-attacks, and ensure that their critical assets are always protected.
In this track, we will explain Zero Trust and why it's needed to protect organizations against cyber-attacks. We will also look at how Zero Trust evolved over time and where it may go in the future. Various use cases for the Zero Trust model will also be discussed.
Receive Continuing Professional Education Credits
KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.
You can get 3 CPEs for this track.
After attending this track you will be able to:
Field of Study: Information technology
Prerequisites: None
Advanced Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)
To register for this session, go to https://www.kuppingercole.com/book/eic2023 and book a hybrid event ticket. In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE Credits please fill and send the following form: https://www.kuppingercole.com/event_cpe/eic2023
After we have checked your attendance you will receive your CPE certificate.