A Zero Trust program demands that every device, user, and network flow is authenticated and authorized. But are they?
You can’t establish Zero Trust without establishing the integrity of your devices down to their underlying firmware and hardware and every device consists of dozens of components relying on integrated firmware supplied by a multitude of vendors. Do you trust them?
Join Paul Asadoorian, security evangelist at Eclypsium, as he dives into how to implement Zero Trust at the device level and implement the strategies necessary to comply with federal guidance to secure the nation’s technology supply chain.
Key takeaways:
 | How and why Zero Trust principles apply to devices, and how these principles need to extend down to bare-metal hardware |
 | How to achieve a Zero Trust posture at the endpoint (and server and network device) level |
 | A playbook to implement, assess and continuously monitor the firmware your digital supply chain relies upon |