CISO Workshop Module 3: Identity and Zero Trust User Access
Learn how to advance zero trust with your identity and user access strategy to better protect corporate data inside and outside your network perimeter.
- Download PDF summary: Module 3: Identity and Zero Trust User Access
- Download PowerPoint summary: Module 3: Identity and Zero Trust User Access
Part 1: Identity and Zero Trust History (9:33)
Part 2: Zero Trust Definition and Models (15:37)
Part 3: Strategy and Priorities (9:54)
Part 4: Account Security: Measuring Cost of Attack Password-less Authentication (13:11)
Part 5: Zero Trust User Access Reference Architecture (8:42)
Part 6: Build an Identity Perimeter (13:57)
Part 7: Identity System Security (3:37)
Part 8: Lowering Risk using business-to-business and business-to-customer (4:47)
Feedback
Submit and view feedback for