Zero Trust: Lessons learned and real-world perspectives from CrowdStrike and EY EY NextGen IAM
-
- Technology
The concept of Zero Trust has been around for the past decade with varying degrees of adoption. During this podcast, Ajit, Ankan, and Michael discuss the shift from perimeter defense mindset to assumed breach. Our speakers discuss common pitfalls and enablers across the six pillars of Zero Trust: Identity, Data, Application, Network, Devices and Infrastructure. This episode also explores the different elements across people, process, technology and culture needed for a Zero Trust journey.
The concept of Zero Trust has been around for the past decade with varying degrees of adoption. During this podcast, Ajit, Ankan, and Michael discuss the shift from perimeter defense mindset to assumed breach. Our speakers discuss common pitfalls and enablers across the six pillars of Zero Trust: Identity, Data, Application, Network, Devices and Infrastructure. This episode also explores the different elements across people, process, technology and culture needed for a Zero Trust journey.
19 min