iSECURE’s 4 Key Components to Adopting a Zero Trust Model (Week 3)


Speaker: Chip Crane, IBM Principal Security Technical Support Manager
When: Wednesday, April 27, 2022
Where: Virtually
Are you struggling with how to practically implement Zero Trust and budget for it?
- Practically Implement Zero Trust
- Discuss Zero Trust with your Board of Directors & Executives
- Budget for Zero Trust
Zero Trust is a proactive approach to protecting your network.
Zero Trust = Trust No One
The Zero Trust model will protect your network not only from insiders but outsiders as well. This is known as third-party risk.
Adopting a Zero Trust model comes with many questions.
Over the past few weeks, we've highlighted on user access controls, two-factor authentication, and mobile device management, however outsiders with access to your network pose an immense risk.
Third-party risk: Do users outside of your organization have access to your network; such as vendors, suppliers or contractors?
- Why it matters: A Zero Trust architecture allows limited access to those people to enable them to do their job, but can also create certain parameters that revoke access once their job is complete.