mlns='http://www.w3.org/1999/xhtml'>
Get techniques, tips & strategies for your zero-trust
When organizations abruptly sent vast numbers of employees home, their carefully planned security architectures were faced with major new challenges. Precious corporate endpoint devices sent to unfamiliar locations, connecting to routers that use default passwords, and sharing space with unsecured IoT devices. Is a zero-trust security architecture even possible in a situation like this? In this Dark Reading webinar, learn how to make layered, zero-trust architecture work among today’s business realities. In this webinar learn: Techniques for implementing zero-trust via segmentation and security zones Tips for stronger authentication and authorization for remote access. Realistic strategies to kickstart zero-trust at a time when security dollars might be slim |
|
|
|
Paul Brager Jr. Technical Product Security Leader, Digital Technology Baker Hughes, a GE Company |
|
|
|
|