Identity Management for a Dynamic Workforce: Zero Trust Versus Risk-Based Security

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

User working patterns have completely turned upside down within the last six months. Recently, most organisations have adopted remote working, collaboration tools, cloud storage and applications into their critical business processes.

Let’s address the elephant in the room: how can businesses securely facilitate access to these applications, data stores, devices and tools?

In this webinar, a panel of security experts will discuss Zero Trust versus risk-based security strategies, analysing the benefits and limitations of both approaches.

Learn how to:

  • Leverage identity management principals in new, intelligent, user friendly and innovative ways
  • Achieve the right balance between user experience and risk mitigation
  • Use identity to secure and protect your digital assets


Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Ian Jennings

Ian Jennings

Managing Director, BlueFort Security

Photo of Ed  Moyle

Ed Moyle

General Manager and Chief Content Officer, Prelude Institute

Photo of Russel Ridgley

Russel Ridgley

CTO UK & IRE, RSA Security

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.