Webinar on Zero-Trust Strategy

Maturing a Zero-Trust Strategy for the Extended Enterprise

This Webinar took place on Thursday, March 18, 2021

Watch the Recording

Webinar Presentation, Martin Kuppinger | KuppingerCole
Webinar Presentation, Richard Archdeacon | Duo Security

Watch the Webcast to Learn More About:

  • What the Zero Trust approach to cybersecurity is and what it's not.
  • What organizations need to do to enable a Zero Trust approach to security.
  • How Zero Trust access models work to protect the modern enterprise.
  • How organizations are using Zero Trust access models to secure access. 

How to meet security and device trust challenges in the 2020s

In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.

Today, most employees are using a mix of corporate-owned and personal devices to access applications, data, and services on-prem and in the cloud, often from outside the corporate network. Only by implementing strict identity verification and least-privilege access policies for every user, device, and application can enterprises secure a mobile and remote workforce.

This approach is commonly known as the Zero Trust approach to security, but it is not a product or even a technology. Adopting a Zero Trust approach to security requires a major paradigm shift in many aspects of IT and even core business processes of an organization, but provides the key to securing access to critical systems and data in the 21st century.

Speakers Contribution

Martin Kuppinger, Principal Analyst at KuppingerCole, will look at how Zero Trust has matured over the past decade, and where it still has to go in the light of the evolution of business, IT, and cybersecurity. He will also look at what organizations must do to implement a Zero Trust approach, and why this is about concepts first, then tools.

Richard Archdeacon, Advisory CISO for EMEA at Duo Security, will explore the concept of a Zero Trust access model strategy for the extended workforce and enterprise, and explain how leading organizations are using this approach to secure access to their critical applications and data in five logical steps.

 Never Miss Another Webinar

Enter your email to subscribe:

Richard is the Advisory CISO for the EMEA region. He was previously with DXC - HPE - where he was a Chief Technologist in the Security Practice working with clients across all industries and regions. Prior to that, he worked for Symantec for many years. He has also held posts with security...

Lead Sponsor


Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.