How to Apply a Zero-Trust Model to Cloud, Data and Identity


Posted on in Presentations

Migration to Office 365, AWS, Azure, GCP and modern endpoints can be done safely when these security tenants are applied: visibility, protection and control. Applying them properly requires a security framework that combines data and threat protection and identity access control in an integrated manner. This session will discuss best practices on how to accomplish zero trust in the cloud.

Learning Objectives:
1: Learn best practices for cloud migrations.
2: Understand the importance of an integrated plan for the migration to be safe.
3: Understand how an integrated cyber-defense platform can help address and mitigate migration challenges.

Pre-Requisites:
Understand the mechanism for executing system migrations to cloud environments.
Participants
Nicolas Popp

Participant

SVP Info Protection, Symantec


Share With Your Community