Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile. Join Manish Dave, Head of Information Security, Aarti Industries Ltd. in a discussion of Zero Trust.
Where does the journey to zero trust begin, what are the typical entry points, and how can it unfold? Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile.
The session will cover:
- How the approach to security has changed dramatically as security perimeters have dissolved
- Assessing the maturity of the zero trust state with a realistic look at security and its dependencies on other functions in securing future work environments
- Aligning zero trust with people, processes and technologies to establish security
Here is the course outline:
The Road to Zero Trust Security |