Name
Zero Trust Access: Five Steps to Securing the Extended Enterprise
Date & Time
Tuesday, April 23, 2019, 2:00 PM - 3:00 PM
Wendy Nather
Description
The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. Attend this session to learn how this model works, and explore practical implementation strategies for your organization in five logical steps.
Location Name
Room 5
Full Address
Palmer Events Center
900 Barton Springs Rd
Austin, Texas 78704
United States
Session Type
Breakout