Beyond the Perimeter: Securing Your Network With Zero Trust and Zero Standing Privileges

Author(s): Cameron Smith

A shift from focusing on the attack surface to the protect surface will help organizations implement an inside-out architecture that protects critical infrastructure, prevents the success of any attack, makes it difficult to gain access, and links directly to business goals. Explore the importance of zero trust and zero standing privileges.

Learn more in this Info-Tech LIVE 2024 presentation.