
Sign up to save your podcasts
Or


The concept of Zero Trust has been around for the past decade with varying degrees of adoption. During this podcast, Ajit, Ankan, and Michael discuss the shift from perimeter defense mindset to assumed breach. Our speakers discuss common pitfalls and enablers across the six pillars of Zero Trust: Identity, Data, Application, Network, Devices and Infrastructure. This episode also explores the different elements across people, process, technology and culture needed for a Zero Trust journey.
By EY Cybersecurity5
1313 ratings
The concept of Zero Trust has been around for the past decade with varying degrees of adoption. During this podcast, Ajit, Ankan, and Michael discuss the shift from perimeter defense mindset to assumed breach. Our speakers discuss common pitfalls and enablers across the six pillars of Zero Trust: Identity, Data, Application, Network, Devices and Infrastructure. This episode also explores the different elements across people, process, technology and culture needed for a Zero Trust journey.