How to Apply a Zero-Trust Model to Cloud, Data and Identity

Posted on in Presentations

Migration to Office 365, AWS, Azure, GCP and modern endpoints can be done safely when these security tenants are applied: visibility, protection and control. Applying them properly requires a security framework that combines data and threat protection and identity access control in an integrated manner. This session will discuss best practices on how to accomplish zero trust in the cloud.

Learning Objectives:
1: Learn best practices for cloud migrations.
2: Understand the importance of an integrated plan for the migration to be safe.
3: Understand how an integrated cyber-defense platform can help address and mitigate migration challenges.

Understand the mechanism for executing system migrations to cloud environments.

Nicolas Popp

SVP Info Protection, Symantec

Security Strategy & Architecture

zero trust infrastructure security critical infrastructure cloud security cloud access security brokers (CASB)



Share With Your Community