CS Talks: The challenges and pitfalls of zero-trust security
Cyber Security Hub discusses the benefits and drawbacks of zero-trust security models
How to overcome common hurdles when implementing zero-trust security models
As the threat landscape develops, so too do cyber security controls. With multiple large-scale data breaches over the past 12 months alone caused by unauthorized network access, companies are eager to find a solution.
To fight against malicious actors trying to gain unauthorized access to their networks, many cyber security teams have turned to using a zero-trust cyber security model. Zero-trust cyber security models require all network users, whether they are outside or inside an organization, to be constantly authenticated, authorized and validated in order to gain access to its network, applications and data.
While zero-trust can help fight against cyber security incidents caused by unauthorized access, it also brings with it some unique challenges and pitfalls that can cause cyber security vulnerabilities rather than protection if not handled correctly.
Join Cyber Security Hub’s Olivia Powell and Leo Cunningham, CISO of biotechnology company Owkin, as they discuss zero-trust security models, their benefits and drawbacks and how to correctly implement this cyber security control.
Join this webinar to discover:
- The common hurdles when implementing a zero-trust cyber security model.
- How to approach and overcome these hurdles.
- The best way to ensure network security through implementing a zero-trust model.
Speaker
Host