Digital Transformation.
Your go-to source for articles and videos on the topic of digital transformation.
Categories
Topics
Adding Context to Information for Better Records Management
Oct 22, 2021 | Digital Transformation, Information Governance, Information Management, Office 365
The ‘zero trust’ security emphasizes that enterprises should have a “trusted” internal network and an “untrusted” external network. The adoption of increasing mobile and cloud and the recent pandemic shows that we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders, including employees, partners, contractors, etc., regardless of their location, device, or network. There is no silver bullet in achieving a ‘zero trust’ security architecture. Still, the identity and access management is the core technology that sets the stage for the ‘zero trust’ journey. The ‘people’ become the new perimeter in this journey, with identity-forming the critical component to establishing a secure environment.
In this presentation by Sami Laine from Okta, you will hear about:
· the shifts in the security landscape that paved the way for ‘zero trust’
· how the ‘zero trust’ extended ecosystem will look like today
· building an effective ‘zero trust’ program and architecture for the future.