THIS BRIEFING IS HOSTED BY VERSION2 IN COOPERATION WITH CISCO SECURE

For a lot of companies, stronger security results in poor user experience and impacts productivity of users. We believe that with the right Zero Trust strategy organizations can achieve higher levels of security without compromising user experience. The sweet spot for Zero Trust is where attackers are frustrated, and users are empowered to do the right thing

More about the breifing

Establish trust by looking at the user, device and the risk profile of the authentication. Enforce trust-based access based on the principle of least privilege and unified access control. Using indicators of compromise, shared signals, behavior monitoring, and vulnerability management can be used to continually verify trust. Finally, responding to changes in trust are possible via prioritized incident response, orchestrated remediation, and integrated and open workflows.

Key takeaways

By the end of the session, you will learn how to approach a Zoro Trust based security architecture, where to start and how to avoid the most common pitfalls. 

Cisco Secure - Zero Trust

Zero trust is a strategic approach to security that centers on the concept of eliminating trust from an organization's network architecture. Trust is neither binary nor permanent. We can no longer assume that internal entities are trustworthy, that they can be directly managed to reduce security risk, or that checking them one time is enough. The zero-trust model of security prompts you to question your assumptions of trust at every access attempt.

SPEAKERS

Kenneth Schwartz
Kenneth Schwartz
Cisco Denmark
Cyber Security Lead
Nick Stokmans
Nick Stokmans
Cisco Holland
Cyber Security Specialist
Jonas Schou-Larsen
Jonas Schou-Larsen
Tech Relations
Senior Media Advisor, Moderator

THE PROGRAM OF THE DAY

Thursday, October 27, 2022
10:00 AM - 10:05 AMIntroduction to the security briefing

Today's host Jonas Schou-Larsen, welcomes our viewers and introduces the speaker panel.

10:05 AM - 10:50 AMPresentation by Cisco's specialists

A Zero Trust platform must perform these four functions:

  • Establish trust
  • Enforce trust-based access
  • Continuously verify trust
  • Respond to change in trust
10:50 AM - 11:00 AMLive Q&A

Our panelists sum up the briefing, highlighting key take-aways. Feel free to send in your questions. 

Arrangør: VERSION2

PRACTICAL INFO

Venue
IDA MØDECENTER
Kalvebod Brygge 31-33
1577 København V

Contact our consultants for specific questions:

Helle Kirk
Senior consultant
hek@version2.dk

Helle Francois Andersen
Commercial Brand Manager
hfa@version2.dk