Making Zero Trust Work With the NIST Framework
- LANGUAGE: English DATE: Wednesday, December 16, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.
Implementing Zero Trust with consistent security policies is tough when applied across all applications, users and devices, especially in existing multi-vendor environments.
90% of the existing security environments in Germany are multi-vendor environments, historically grown. Leveraging the benefits of Zero Trust remains particularly challenging in these environments.
Join this webinar and learn:
- About the security requirements of multi-vendor environments
- How these requirements can be addressed successfully with Zero Trust
- Why identity and context are so important for Zero Trust
- Why IAM orchestration is essential for multi-vendor Zero Trust
KuppingerCole Lead Analyst Matthias Reinwarth will present the basic security assumptions of the Zero Trust approach and how IAM can complement that.
He will be joined by Dr. Sarah Wolff, Director DACH at Transmit Security, and Eric Padua, the former Head of Security Architecture at UBS and now CIO for securing the Electronic Patient Records of Swiss citizens. Sarah & Eric will share their experiences how Identity & Access Management can act as an enabler for a working Zero Trust architecture in a multi-vendor environment.
2nd Alon Build, 94 Yigal Alon St. (8th floor, Suite #21) • 6789139 Tel Aviv • Israel
Transmit Security provides a best-in-class identity orchestration platform designed to simplify, accelerate, and reduce the cost of identity-related projects across channels. That reduction is accomplished by abstracting the identity-related business logic (which is complex and always changing) away from channel applications (web, mobile, call-center, kiosks, other) and to the platform's unique over-the-air orchestration and decisioning layer.
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.