Implementing Zero Trust
Facebook Twitter LinkedIn

The Path to Zero Trust by Securing Privileged Identities

Combined Session
Wednesday, May 11, 2022 18:10—18:30
Location: A03-04

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on foundations that are essential across your cybersecurity strategy, delivering greater value from existing cyber investments. In this session, we will outline:

The Path to Zero Trust by Securing Privileged Identities
Event Recording
The Path to Zero Trust by Securing Privileged Identities
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
The Path to Zero Trust by Securing Privileged Identities
Presentation deck
The Path to Zero Trust by Securing Privileged Identities
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Brian Chappell
Brian Chappell
BeyondTrust
Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address