efe44b90-cc8e-4788-b925-120f3be4e68b

Why Zero Trust Network Access is not your silver bullet

The fundamental principle underpinning Zero Trust requires all users within and outside an organisation’s network to be authenticated, authorised, and continuously validated.

Nonetheless, it is not a silver bullet by any means. Recent studies show that in the next three years, over 50% of all cyber threats will be focused in areas that Zero Trust principles cannot mitigate nor control. 

In our next episode of teissTalk with Thom Langford, we’ll explore:

  • Where does Zero Trust fall short, and why these failings encourage cyber-crime
  • Expanding Zero Trust to protect the data itself
  • Identifying, classifying, and securing sensitive data through automation


Join this episode to discover how  cyber attackers are circumventing Zero Trust principles and how best to close those security gaps.

 

 

Featured Speakers

Thom Langford

Thom Langford

CISO, Security Executive and Advisor

teissTalk Host

Jean Carlos

Jean Carlos

VP Cyber Security

BOXT

Sasha Henry

Sasha Henry

Senior Managing Consultants

CyXcel

Karim Eldefrawy

Karim Eldefrawy

CTO and Cofounder

Confidencial


I understand and agree that Lyonsdown Limited may collect and process my personal data ahead of teissTalk for the purpose of operating such webinar in accordance with our privacy policy
I hereby provide my explicit consent for Lyonsdown Limited to use my personal data for their marketing purposes in accordance with our privacy policy
I hereby provide my explicit consent for Lyonsdown Limited to share my personal data with Confidencial for their marketing purposes as governed by their Terms and Conditions and Privacy Policy.