Security
RSA 2020: How to Get to a Zero-Trust Cybersecurity Architecture
More organizations are becoming interested in moving to a zero-trust model for their cybersecurity. Under zero trust, every user and transaction must be validated for access to be granted. While the approach offers much more granular control for IT security leaders, it is not something that can be adopted overnight. At RSA 2020, we spoke with cybersecurity thought leaders on how organizations can effectively move to zero trust.
View more of our coverage from the RSA 2020 Conference and gain insight into how the conversation on cybersecurity is growing and evolving.
Participants
Ash Devata, Vice President of Products, Duo Security – Cisco
Tim Li, Principal, Deloitte Risk & Financial Advisory
Bill Conner, CEO, SonicWall
Video Highlights
- Zero trust represents a mindset shift in cybersecurity in which every transaction is verified before access is granted to users and devices.
- Identity management and authentication are central to zero trust, and zero trust enables more granular control related to access in an organization's environment.
- Organizations will not be able to move to zero trust without bringing IT, application and security teams to work together on policies.