What: FREE Webinar
When: June 10, 2021 at 2:00 PM EDT
Zero Trust, Who Watches the Watchmen?
There has been no such thing as a closed security network since analog CCTV. In fact, 40% of cyber breaches actually originate with authorized users accessing unauthorized systems.
Recent security breaches and growing threat to security devices, have many security professionals asking how does the Zero Trust model apply to physical security systems? The legacy approach is to establish trust: trust IP addresses, trust ports, trust files. But recent events and the shift to IoT, demands that we adopt a new way of thinking and building our security architecture. Never trust. Always verify. In this webinar we will explore what that means and the architecture behind an environment that says no device, user, workload or system should be trusted.
- Understand the history of Zero Trust environments in IT and how it relates to physical security architecture
- Identify the elements of a Zero Trust architecture
- Evaluate the benefits and challenges to adopting this approach
- Assess whether zero trust is the right framework for their system’s architecture going forward