The zero trust approach is centred on the belief that an organisation should verify anything and everything trying to connect to its systems before granting access. Many companies provide company-owned devices, but – in the interests of employee freedom and ease of access – do not give direction around the use of additional peripheral devices.
A robust zero trust policy is one that applies to every device: business owned or personal, inside or outside the company’s physical perimeters, regardless of the information stored or activity performed. Every device represents a potential vulnerability, and therefore none can be assumed trustworthy.
Join the TechMonitor editorial team and a selection of expert speakers as we evaluate the effectiveness of zero trust approaches, and share strategies for overcoming the challenges that hundreds of businesses are facing as they consider stepping up their cybersecurity processes.
Questions for discussion:
- How is the zero trust approach helping to minimise the occurrence of breaches? Does it have any effect on mitigating their impact?
- How do zero trust models differ from the castle-and-moat mentality? What do IT teams need to focus on as they transition from one to the other?
- What challenges do businesses face when designing and building adequate frameworks? How can they find the talent, the time and the budget, not only to implement these processes in the first place but to constantly maintain and improve them?
- Can certain devices be “whitelisted” to save time, or does this undermine the whole idea of zero trust? How do IT teams develop a process that is thorough, but is also straightforward enough that the entire organisation will adopt?