Is Your Security Model Evolving?
Date & Time
Tuesday, March 10, 2020, 2:00 PM - 3:00 PM
Douglas Holland

Significant digital transformation is now ubiquitous across most industries, and as a result, organizations are turning inside out. Applications increasingly reside in the cloud, outside of IT's traditional zone of control. At the same time, cyber criminals are intensifying their efforts. More than 250,000 malicious programs are registered every day, and the number of emails containing malware has increased significantly. As both company infrastructures and the threat landscape changes, how should organizations protect their applications, data, users, and devices?

Many organizations have chosen to implement a zero-trust security model that pivots the common mantra of “trust but verify” to “verify and never trust.” You must assume that the environment is hostile and use the concept of least privilege as a guide. In this session, we will explore what zero trust architecture is, and strategies as to how you can deploy this model in your environment.

Location Name
Room 2
Full Address
Palmer Events Center
900 Barton Springs Rd
Austin, TX 78704
United States
Session Type