Posted on
in Presentations
Despite the broad scope, popular Zero Trust models fail to include Data Backup and Recovery Systems, which are often targets of ransomware and data exfiltration attacks. This session will introduce an extension of the Zero Trust Maturity Model and a set of requirements to fill this gap. These enhancements improve enterprise resilience, strengthen a common area of weakness, and show security value.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community