Training

2018 New York Security Summit , Governance & Risk Management , Government

How to Implement the Zero Trust Security Model

How to Implement the Zero Trust Security Model

Snowden proved you can't trust on the inside. OPM proved you can't trust the outside. Who should you trust when it comes to your data? No one! In this provocative and informative presentation, retired Brigadier General Greg Touhill, the first Chief Information Security Officer of the U.S. government and current president of the Cyxtera Federal Group, will discuss how nation state actors, cyber criminals, and hackers leverage fundamental weaknesses in TCP/IP, tools, and architectures to breach current cyber defenses and what you can do to stop them. He will recommend a common sense approach to harden your people, processes and technology against cyber threats while delivering results that are effective, efficient, and secure.

See Also: Public Sector Cloud Security: Key Questions to Be Answered

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.