
Sign up to save your podcasts
Or


Digital transformation is causing an explosion of hyper-connected IT, IoT and IoMT devices and, with it, a greatly expanded cyber-attack surface. In such an environment, how can organizations begin to plan for a zero trust architecture beyond the managed users and workstations? In this important session, leaders will tackle a number of issues, including: how NIST defines Zero Trust and its 7 steps to get there; some common pitfalls to avoid; and why Zero Trust doesn’t stop at managed users and workstations.
Source: Exploring a Zero Trust Architecture – Getting Started & Avoiding Pitfalls on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
By Anthony Guerra5
33 ratings
Digital transformation is causing an explosion of hyper-connected IT, IoT and IoMT devices and, with it, a greatly expanded cyber-attack surface. In such an environment, how can organizations begin to plan for a zero trust architecture beyond the managed users and workstations? In this important session, leaders will tackle a number of issues, including: how NIST defines Zero Trust and its 7 steps to get there; some common pitfalls to avoid; and why Zero Trust doesn’t stop at managed users and workstations.
Source: Exploring a Zero Trust Architecture – Getting Started & Avoiding Pitfalls on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

3,218 Listeners

112,539 Listeners