Zero Trust Implementation Tips & Techniques
Date: Wednesday, May 18th at 10 a.m. PT / 1 p.m. ET
Zero Trust is exactly what it sounds like; an approach to security in which nothing is trusted to be what it says it is and everything must be confirmed before it is allowed to access the network. Security has never been simple, and Zero Trust doesn't pretend to be. There are lots of moving parts, but a sensible methodology and consistent application will get you far further far faster. We'll examine the components Gartner originally identified when they first defined Zero Trust, and some that have evolved. We'll also examine how to approach it from a broad encompassing level down to as many areas of detail as we can fit into one session. Included:
- Zero-Trust as a Culture
- The Components of Zero-Trust
- Everything is a Potential Threat
- The Importance of Policy
- Producing a Proof Process
- Being Deadly Serious about Identity & Access Management (IAM)
- Involving & Supporting DevOps
- Develop a Detailed Roadmap
- On Trusting Yourself
Here is the AGENDA for the summit:
9 a.m. PT / 12 noon ET
Modern Identity Management Best Practices for Enterprises
10 a.m. PT / 1 p.m. ET
Zero Trust Implementation Tips & Techniques
11 a.m. PT / 2 p.m. ET
Hottest Third-Party Solutions
Register now!
About the presenter:
Howard M. Cohen, Sr. Resultant, The TechChannel Partners’ Results Group
He is a 35+ year executive veteran of the Information Technology industry who today writes for and about the IT channel. He’s a frequent speaker at IT industry events that include Microsoft Inspire, Citrix Synergy/Summit, ConnectWise IT Nation, ChannelPro Forums, Cloud Partners Summit, MicroCorp One-On-One, and CompTIA ChannelCon, frequently hosts and presents webinars for many vendors and publications.
Duration: 1 hour