Associate Partner and Cyber Expert McKinsey & Company
The concept of zero trust has become the gold standard of security methodologies enabling remote work and BYOD. This became even more critical as the pandemic continues to revolutionize the work-from-home paradigm. The challenge here, however, is that implementation can be daunting. There are different interpretations of "zero trust" and a whole field of products claiming to bring a full-field solution.
In this session, we discuss practical implementations of zero trust in cloud environments that can get you well on your way to an agile, secure and maintainable environment that can extend out to any of your organization resources. At the conclusion of the session, resources are shared to help attendees get started on zero trust initiatives in their own organization, public sector or private.
Learning Objectives:
Define zero-trust principles and architecture.
Describe the process for starting realistic zero trust initiatives at their organization.
Implement the basic architecture principles necessary for a zero trust foundation in cloud environments.