High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage.
John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks.
In recent years, Zero Trust has evolved to become a strategic cybersecurity initiative that major enterprises are adopting to prevent successful attacks.
Join us to hear security experts discuss the "hows and whys" of building a Zero Trust architecture and learn:
- The fundamental concepts behind implementing a Zero Trust Architecture
- Where to start when planning and enforcing Zero Trust
- How the Security Operating Platform supports the applications of Zero Trust with common cybersecurity use cases