Zero-Trust Security: Making Remote Working, Work

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Cloud applications and hosting services continue to grow in popularity with enterprises because of the benefits they can provide in scalability, flexibility and costs.

Users whose digital lives are increasingly mobile don’t want to be tied to their desks, and an effective security strategy must be flexible enough to protect access from boardrooms and bars, cubicles and coffee shops alike. However, the key is mastering said effective security strategy so that it allows for safe, seamless and remote working for all employees.

The principles of zero-trust security can address this challenge and help you maintain your security posture regardless of whether a user is working on your network or on-the-go.

In this webinar, we will discuss the fundamentals and application of zero-trust principles, and outline how you can implement them in your own environment.

Key takeaways:

  • The security benefits of zero-trust security
  • How to effectively implement and manage a zero-trust approach
  • Key insights on making remote working secure and safe for your organization

Speakers

Nikhil  Khare

Manager of Applications Integrations, Duo Security

Sam Temple

Managing Director, JUMPSEC

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.