Zero Trust
Facebook Twitter LinkedIn

Zero Trust

Thursday, May 11, 2023 14:30—18:30
Location: B 09

Zero Trust cybersecurity is an approach to security that assumes that every user and device accessing an organization's network or resources, including those within the organization's network perimeter, should be treated as a potential threat. In a zero-trust model, access to resources is not automatically granted based on a user's location or the fact that they are already within the network. Instead, access must be explicitly granted, authenticated, and authorized per session based on the user's identity, device, context, and behavior. Zero Trust also emphasizes the principle of least privilege, ensuring that users only have access to the resources needed to perform their jobs and nothing more.

Zero Trust is vital because traditional perimeter-based security approaches are no longer effective in today's increasingly complex and distributed IT environments. With the rise of cloud computing, mobile devices, and the Internet of Things (IoT), the network perimeter has become increasingly porous, and the number of potential attack surfaces has multiplied. Organizations can no longer rely solely on firewalls and other perimeter defense to protect their assets. Instead, they need a more holistic approach to security that focuses on protecting their data and resources wherever they may be, assuming that no user or device can be trusted implicitly. By implementing a Zero Trust model, organizations can improve their security posture, reduce the risk of data breaches and cyber-attacks, and ensure that their critical assets are always protected.

In this track, we will explain Zero Trust and why it's needed to protect organizations against cyber-attacks. We will also look at how Zero Trust evolved over time and where it may go in the future. Various use cases for the Zero Trust model will also be discussed.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website:

You can get 3 CPEs for this track.

After attending this track you will be able to:


Field of Study: Information technology

Prerequisites: None
Advanced Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, go to and book a hybrid event ticket. In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE Credits please fill and send the following form:
After we have checked your attendance you will receive your CPE certificate.

John Tolbert
John Tolbert
Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...
Richard Hill
Richard Hill
Richard Hill is Senior Analyst at KuppingerCole. He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace,...

May 11, 2023
14:30 - 14:50
Zero Trust with Zero Buzz

May 11, 2023
15:30 - 15:50
Beyond Zero Trust to Achieve Zero Friction


On-Demand Access
Re-live EIC 2023
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address