Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Webinar
Webinar
Understanding the Privacy Evolution to Get Ahead of the Curve
In the age of big data, AI, multi-cloud and hybrid IT environments, and ever closer links between customers, third parties and organizations, businesses need to think more carefully about privacy....
Learn more
Blog
Blog
EIC Speaker Spotlight: Peter Busch on Trust as the Key Concept
Peter Busch, Product Owner Distributed Ledger Technologies Mobility at Robert Bosch Group, is to deliver a presentation entitled Trust as the Key Concept in Future Mobility on Tuesday, September...
Learn more
Whitepaper
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #56: The Project Road Towards Zero Trust - What to Do and Where to Start
This podcast has already looked at the Zero Trust concept as a challenging architectural paradigm for security and an important component of modern and future-oriented security architectures from...
Learn more
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and...
R.O.N. - Return on Negligence – The Impact of Cybercrime
Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the...
Microshard Technology: An Enabler for GDPR/Schrems II Compliance
Event Recording
Microshard Technology: An Enabler for GDPR/Schrems II Compliance
This session will examine the ruling of 16 July 2020, where the Court of Justice of the European Union (the Court) in its Case C-311/18 Data Protection Commissioner v Facebook Ireland and...
Model to Quantify Cyber Security Risks
Event Recording
Model to Quantify Cyber Security Risks
Get a model and recommendations to quantify cyber security risks including the costs of fines, contractual compensations, service credits, and loss of income. The use of heatmaps with...
Zero Trust Journey, How We Moved from an Immature Organization to Zero Trust
Event Recording
Zero Trust Journey, How We Moved from an Immature Organization to Zero Trust
This is the story of our journey to Zero Trust, from the initial analysis to its technical and effective implementation. As many organizations our starting point was not the best one (lack of...
Zero Trust Is Table Stakes, Zero Knowledge Is the Next Evolution
Event Recording
Zero Trust Is Table Stakes, Zero Knowledge Is the Next Evolution
Zero trust has been around in one shape or form in security for many years, usually under different names like the "Principle of least privilege" or "Mandatory Access Control'. It exists for a...
Security Automation: Realizing Business Benefits, Without Adding Headcount
Event Recording
Security Automation: Realizing Business Benefits, Without Adding Headcount
The next generation of cyber threats have arrived and there aren’t enough security people or budgets to handle the growing volume and complexity. This presentation will explore...
Panel | Getting Started on Your Zero Trust Journey
Event Recording
Panel | Getting Started on Your Zero Trust Journey
As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero...
Enterprise Access Control for Zero Trust
Event Recording
Enterprise Access Control for Zero Trust
With many privileges to manage within an organization, authorization within an Enterprise can be a challenge. As capabilities in any organization are often in a state of constant change and...
Passwordless Authentication
Blog
Passwordless Authentication
Passwords have not been fit for purpose for a long time. They are too easy to guess, crack, discover, and steal. Passwords are also costly and time consuming to manage, and password reuse is a...
Previous
2 3 4 5 6 7 8 Next