Skip to content

Supporting Event: Adopting Zero Trust for Remote Access

Date: 20 Jan 2021 (Wednesday)
Time: 11:00am
Venue:  Live Webinar
Language: English
Fee: Free
Register: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=454673&utm_source=chapter

Highlight:
By definition, a Zero Trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment of technology to monitor and manage data between zones, and more importantly, user interactions within a zone(s). A Zero Trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes like the cloud, DevOps, and IoT have either blurred, or dissolved altogether, the idea of a traditional perimeter.

While the Zero Trust model has become a trendy catchword in IT, it is complex and difficult to implement for many organizations in Asia Pacific, because it requires the establishment of a model of trust, verification, and continuous evaluation of trust for further access and lateral movement.

Join BeyondTrust and (ISC)² on Jan 20, 2021 (Wed) at 11am (GMT +8), Ajay Kumar, Director for Security Engineering at BeyondTrust, review the practical shortcomings and limitations of a Zero Trust model, and explain how to achieve Zero Trust using the Privileged Remote Access model.

Presenter: Ajay Kumar, Director for Security Engineering – APJ, BeyondTrust
Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor – Asia-Pacific, (ISC)²

More Info: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=461297&utm_source=chapter

Categories

Event

Tags