Webinar Replay – The Components of Zero Trust
Shifting to a zero-trust model is imperative if your goal as a cybersecurity professional is to get away from the perimeter-based model. But:
• What are the components of zero trust, and what does it take to implement them?
• What should you do first, second, and third?
• What are the must-have technologies and practices?
This webinar provides a blueprint for cybersecurity professionals seeking to move from perimeter-based to zero-trust security.
The Components of Zero Trust
Presented by: John Burke, CIO and Principal Research Analyst, Nemertes Research
Date: August 19, 2019
Time: 1:00 pm ET