
Sign up to save your podcasts
Or
Zero Trust is becoming a core pillar of cyber security for many organisations – and with good reason. We break down the concept into its simplest parts, and step through exactly how it differs from the more traditional approaches that came before it. We’ll review how its adoption in the public sector has helped protect critical systems and data, as well as how it can help insulate organisations from risks such as those posed by third-party suppliers and endpoint devices. We take a high-level view of how to get started with Zero Trust, before ending on the potential user impacts that implementation can have, and how to mitigate any suboptimal user experiences.
Zero Trust is becoming a core pillar of cyber security for many organisations – and with good reason. We break down the concept into its simplest parts, and step through exactly how it differs from the more traditional approaches that came before it. We’ll review how its adoption in the public sector has helped protect critical systems and data, as well as how it can help insulate organisations from risks such as those posed by third-party suppliers and endpoint devices. We take a high-level view of how to get started with Zero Trust, before ending on the potential user impacts that implementation can have, and how to mitigate any suboptimal user experiences.