Zero Trust Architecture: The Defacto Network Segmentation Approach


Posted on in Podcasts

Agility is not a strategy, and Zero Trust is not a product you can buy. In a Zero Trust approach as identity becomes more important than ever, managing the lifecycle correctly is critical, during provisioning, use as well as destruction. These are some of the reasons why Zero Trust architecture is becoming the defacto segmentation approach in our digital-first world. Interrelated are the opportunities in both Edge Computing and DevSecOps to help businesses differentiate products and services by transitioning to more collaborative and risk-based security. Join us as we discuss Zero Trust, DevSecOps and Edge Computing with two industry experts who will explore the ways in which these approaches to customer-centric transformation can help businesses stay competitive.

Participants
Diana Kelley

CISO, Protect AI

Phoram Mehta

CISO-APAC, PayPal

Kacy Zurkus

Director of Content, RSAC

DevSecOps & Application Security Security Strategy & Architecture

business continuity & disaster recovery cloud security endpoint security secure coding security architecture zero trust


Share With Your Community