On June 13, C-level and senior management leaders from global companies spanning multiple industries will gather in San Francisco at SecurIT: the Zero Trust Summit for CIOs and CISOs.
Hosted by IDG (publishers of CIO and CSO) and Centrify, this first-of-its-kind event will provide greater understanding around the concept of Zero Trust Security. Specifically, it will help define what Zero Trust is, why it matters, and help business leaders identify the best places for their organizations to start or continue on the journey to Zero Trust.
The concept of Zero Trust can sound confusing (or perhaps even insulting), but the idea behind it is simple: in today’s borderless, global, mobile, cloud-based environment, traditional security approaches do not work. Worldwide security spending is forecasted to reach $91 billion in 2018 by research firm IDC, but every week we see headlines about breaches at companies of all sizes, spanning all industries. How is this happening with all the money being spent to protect the enterprise?
In short: we’re doing security wrong, and it’s time to rethink security with Zero Trust.
A COMPLETE RETHINK OF SECURITY
In today’s Cyber War, hackers know it’s not the best of use of their efforts to go up against the latest, greatest technology. Why do that when they can leverage the path of least resistance: default, stolen or weak credentials? Verizon reports that 81% of breaches are taking this route. All it takes is the ability to identify the one person in your organization who still uses ‘password’ with their standardized username and the bad guys are in.
Therefore, we have to assume that bad actors are already inside, accessing our data and looking to get as much privileged access as possible. The more privilege they can get, the closer they are to having the ‘keys to the kingdom’ and as much control as possible, where they can do the most damage.
Stopping these bad actors requires next-gen solutions that can offer real protection for the modern enterprise without creating roadblocks that hamper employee productivity.
Centrify Zero Trust Security enlists a four-pronged approach:
- Verify the user
- Validate their device
- Limit access and privilege
- Leverage machine learning to learn and adapt to user behavior
SECURIT: THE ZERO TRUST SUMMIT
At SecurIT, we’ll be joined by some of the world’s leading cybersecurity authorities to clearly break down how to rethink security with Zero Trust, and build it back up with effective next-gen solutions that can stop the breach.
Among them are John Kindervag, who founded the concept of Zero Trust while an analyst at Forrester, and his successor, Forrester Principal Analyst Dr. Chase Cunningham, who has taken the mantle and developed a Zero Trust framework for enterprises as network borders continue to dissolve. And you’ll hear from multiple practitioners like LiveNation, Yapstone and Edgewater Networks on their journey to Zero Trust and tips on building a business case within your organization.
The event promises to deliver key learnings, best practices, and valuable insights from those leading the way with Zero Trust. You can review the agenda here. We hope you’ll be able to join us on June 13 in San Francisco.
This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.