Zero Trust architecture and relationship with cybersecurity #
The complex needs of the business environment present a tremendous challenge to traditional approaches to perimeter and cybersecurity. The “perimeter” is fluid, and hence the “never trust, always verify” concept of the Zero Trust security model is gaining traction. The groundwork and preparation required to implement this approach needs more visibility into the network regarding users and traffic. Creating segmentation within the IT architecture and enabling context-based access offers unique paths to address risks from unauthorized access and unauthenticated logins. It also elevates the need to have trusted access based on identity.
As a cybersecurity practice, the Zero Trust architecture removes implicit trust. This implies that the organization has an inventory of critical assets and the means to observe those for any attacks. The “least access” approach necessary for complete Zero Trust architecture brings about changes in access patterns for users, applications, workflows and infrastructure. With this, businesses hope to reduce the risks inherent in cloud and hybrid IT architecture, gain better control over these environments, and be more closely aligned with compliance requirements for the business.
Takeaways for participants #
- Understanding the challenges in the transformation to a Zero Trust architecture.
- Gaining perspectives from practitioners who have led such transformations and prepared business.
- Preparing business workflows for the adoption of Zero Trust architecture.
- Evaluate risks inherent in present cybersecurity approaches and determine the best path forward.
- Case studies.
Who should participate #
- Product Managers
- Software Developers
- Product Designers
- IT systems auditors
- Journalists and reporters (law, technology and security domains)
In-person conference and online pre-conference talks #
Pre-conference talks will be held online. The conference in May will be held in-person in Bangalore. RSVP to participate in the forum, and the conference. Purchase a subscription to support Rootconf’s community activities.
Code of Conduct: Hasgeek’s Code of Conduct applies to all participants and speakers.
COVID protocols and masking policy: In keeping with COVID protocols, the following applies to all participants:
- Participants attending the meetups in person must keep their vaccination certificates handy. The venue may ask you to show your vaccination certificate as proof of being fully vaccinated.
- Wearing masks is optional.
Contact information: For queries about the conference and pre-conference activities, contact Hasgeek at email@example.com or call (91)7676332020.