In the multi- and hybrid-cloud era, anything less than a zero trust approach to security is reckless. But as bad actors become more inventive and the diversity of data workloads requiring protection increases, it is not enough to adopt single cybersecurity point products or paper warranties – you need to go further to protect your business.
To help you, we’ve gathered a group of industry experts, including renowned cybersecurity leaders Dr Sally Eaves and Rob May who will explore:
To help you, we’ve gathered a group of industry experts, including renowned cybersecurity leaders Dr Sally Eaves and Rob May who will explore:
What zero trust is and isn’t | |
The NIST Cybersecurity Framework and how to apply it in real life | |
Common pitfalls and real-life examples | |
Being incident-ready – from technology and process to culture and skills |