- This event has passed.
Breakout Session: Zero Trust – Protecting Data at the Source presented by CTO Jonathan Halstuch
Thursday, September 3rd 11 – 12pm EST
A concerted effort must be made to protect critical sensitive data and not just the network. The data is what an adversary is trying to steal and manipulate. A zero trust approach to data security doesn’t rely on a trusted core like traditional approaches. Instead, zero trust strives to improve data security and reduce complexity. This approach can be leveraged by a project or organization of any size and ensures continuous compliance with guidelines such as the JSIG/RMF and CMMC.