Zero Trust: Solving IT Security’s Identity Crisis

  • LANGUAGE: English DATE: Thursday, May 03, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Zero Trust: Solving IT Security’s Identity Crisis
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.

Instead, in times when the corporate security perimeter has almost disappeared, they should concentrate on rethinking their core defenses by maturing their identity and access management strategies to secure applications, devices, data, and infrastructure — both on-premises and in the cloud. This reflects a common misperception in the industry of the real attack vectors and illustrates the “identity crisis” that IT security faces.

Organizations need to recognize that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats from both external and internal malicious actors. Until IT professionals start implementing identity-centric security measures, account credentials will remain the largest unprotected attack surface for data breaches.

This webinar outlines an entirely new approach — Zero Trust Security. This paradigm assumes that nothing in your corporate IT infrastructure — including users, endpoints, networks, and resources — is ever trusted, and each interaction must be verified to decrease the chance of a security breach. Zero Trust Security ensures secure access to resources while significantly reducing the possibility of access by bad actors.

Join this KuppingerCole webinar to:

  • Learn about Zero Trust Security and the reasons for a paradigm shift;
  • Understand the four essential pillars of Zero Trust Security in the context of Next-Generation Access;
  • Learn how to evaluate your organization’s current Zero Trust Security posture against a best practices maturity model;
  • Develop a Zero Trust Security implementation strategy for your organization to secure access to resources while significantly reducing the possibility of compromise by bad actors.

In the first part of the webinar, Paul Simmonds, Fellow Analyst at KuppingerCole, will tap into his former experience as a global CISO and explain why organizations often ignore identity and credential-based threats when it comes to developing an effective cyber defense strategy.

In the second part, Dr. Torsten George, Product Evangelist at Centrify, will provide an overview of the Zero Trust Security model and outline a step-by-step plan on how to implement it in your organization.


Speakers

Dr. Torsten George is a product evangelist at Centrify and frequent speaker on cyber security, identity and access management, as well as risk management strategies worldwide. He regularly provides commentary and byline articles for media outlets, covering topics such as data breaches, incident...

Paul is the CEO of the Global Identity Foundation, as well as a consulting CISO and was previously the Global CISO for AstraZeneca, Global CISO for ICI, Head of Information Security with a high security web hosting provider and Global Information Security Manager at Motorola. Paul co-founded...


Lead Sponsor

Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access - without impacting user experience. Centrify's Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses. 

Watch now

Downloads

Webinar presentation, KuppingerCole

Webinar presentation, Centrify

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation

GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the concept of “consent,” which is fairly new for most data controllers. Now, with the GDPR regulation in force, parties processing personally identifiable information need to ask the user for his/her consent to do so and let the user revoke that consent any time and as easily as it was given.

Next Conference

Conference

Consumer Identity World EUROPE 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00