Webinar: Zero trust approach to cloud security
The assumption that systems and traffic within an organisation can be trusted is flawed, because today’s networks no longer mirror those that made perimeter defence make sense a few years ago. This is seeing zero trust becoming a popular topic of conversation among CISOs today.
Zero trust aims to solve the inherent problems in placing trust in the network through an approach that requires all users, even those inside the company’s enterprise network, to be authenticated, authorised, and continuously validated before being permitted access to applications or data.
This is even more important when it comes to today's cloud platforms that are increasingly complex to manage due to their ultra-fine-grained access rights. Most companies struggle to get a grip on who has access to what, and whether or not that access is being used, says Hans-Robert Vermeulen, Cloud Platform director EMEA at SailPoint.
According to him, getting cyber security right is quite a challenge. “Many companies are doing a lot around their security and mostly think they have it all in hand. The reality though, is that I have yet to meet a single prospect that is using more than 40% of the access rights they have granted their people and other identities in the cloud. This means that most, if not all, cloud environments are heavily over-privileged and if an identity is compromised, the attack surface is much larger than what it should be.”
Vermeulen says the cool thing about zero trust is that it can open people's eyes that security is much more than just keeping the bad guys out of the network. “When talking to clients, the fact that they acknowledge that at one point in time their network will be breached has opened their eyes as to the additional security measures they need to put in place to protect their data and their people.”
Vermeulen will be presenting on ‘A zero trust approach to cloud platform security’ during an ITWeb Cloud Webinar held in partnership with SailPoint, on Wednesday 11 November 2020.
During his talk, attendees will hear why Identity has become the new security perimeter and why application-level security is a key focus point that is all too often overlooked. The reality is that on the most adopted cloud platforms, companies cannot even answer the simple question of “Who has access to what”. So, what do you need to do get that answered? The session will explain why this is so important and how it helps you strive for zero trust in your environment.”
This Webinar is part of series, Re-imagining cloud in a post-COVID world, from 10-12 November.