Skip to content
Explore All

ZT Q&A with Greg Touhill


Course
Upgrade subscription below

In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.

In this breakout Q/A session, Greg answers some of the top questions. He discusses how successful implementation of zero trust starts with understanding one's data environment and setting access rules and conditions. Greg suggests that leaders need to communicate the strategic objectives of zero trust across the entire organization. He also advises caution when adopting zero trust enabling technologies, recommending checking references and learning from others' experiences.

Summary:

  • Zero trust security is a strategic approach, not a product, to protect data and ensure authorized access
  • Successful implementation begins with understanding the data environment and setting access rules and conditions
  • Leaders must communicate strategic objectives across the organization and carefully evaluate zero trust enabling technologies by checking references and learning from others' experiences

Here is the course outline:

ZT Q&A