The Path to Zero Trust: Start with Identity Security and Least Privilege

A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls? During this discussion, Public Sector thought leader, Josh Brodbent, will discuss how to manage identity to ensure agencies are aligned with recent policies such as Biden’s Executive Order on Cybersecurity and the NIST 800-207 Zero Trust Architecture.

Speakers

Josh Brodbent, Sr. Public Sector Security Director, BeyondTrust

Sponsored Content by

Learn More