Skip to content
Explore All

Zero Trust & Cyber Resilience: A CISO's Approach


Course
Enroll

Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.

Where does the journey to zero trust begin, and what are the common entry points for accessing data? Experts agree that zero trust is based on the "assume breach" premise that treats every asset as breached and all traffic as hostile.

The question that arises is: Are CISOs using the zero trust concept to establish cyber resiliency to improve their defenses in fighting threats?

This session will cover:

  • How has the approach toward security changed as security perimeters disappear?
  • How to assess the maturity of the zero trust state with a realistic look at security and its dependencies on other functions in securing the future work environment?

Here is the course outline:

Role of Zero Trust in Establishing Cyber Resilience: A CISO's Pragmatic Approach