Thursday, June 1
11:30 am - 12:20 pm
Field Chief Technology Officer
Session Abstract: From Presidential mandates to C-Level decrees, the call to start the Journey to Zero Trust has sounded. But, less than 1% of enterprises today have a mature Zero Trust program in place, which means most identity professionals are just getting started. Like any hero’s quest, adopting an identity-first approach means overcoming obstacles, starting with highly distributed, disparate, or heritage identity stores. The session will address the 4Cs of your Zero Trust foundation: Clean, Correlate, Consume, Control.
Step one is to create reliable pipelines of accurate, complete, and up-to-date identity data across the enterprise. Policy-driven access at the edge, on the network, across data sets and at the application layer requires an expanded identity profile far more inclusive than just AD attributes. However, as IT sprawl accelerates and larger attack surfaces emerge, identity information is now spread across legacy, hybrid and multi-cloud systems. The challenge is supporting multi-attribute-based confidence levels in a least-privilege access model without putting excessive burden on your organization’s end-users.
This masterclass will explain how to unlock identity data so you can close security gaps. With real-life lessons from the Fortune 500, the DoD, and the NIST labs, show why Zero Trust all starts with your identity data.