Defining Security Posture in a Zero Trust World

22 May 2019 - 1:00PM SGT; 3:00PM AEST
Security experts generally agree that there are three pillars to a Zero Trust approach: access, identity, and posture.

In previous webinars, we explored access and identity — how an identity-driven approach, when used with a cloud proxy, can better secure access to internal applications.

In this new webinar, we dive into the third pillar: posture. What it means to users and their devices, and how to integrate it into a Zero Trust architecture. We will also cover the mitigation aspect of posture. We’ll share API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

ITUpdate loading