Trusting Zero Trust: Why Red Teaming Is The Only Answer


Posted on in Presentations

As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model is key to securing data, systems, and services. This session will explore why red teaming is uniquely able to help organizations minimize risk and enable robust and timely responses.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Amie Wozniak

Participant

Project Manager, Nth Degree

Cecilia Marinier

Participant

RSA Conference Program Manager, Self Employed

Ken Shelton

Facilitator, Participant

VP Engineering, Randori

Risk Management & Governance

penetration testing risk management zero trust


Topic

Subtopic


Share With Your Community