The Enemy Within: Fighting Cyber Attacks When The Intruder is Already Inside

Never trust, always verify. That mantra – which forms the core of the Zero Trust model – now resonates with organizations around the globe. It has become the strategy of choice for keeping threat actors outside the perimeter.

But what happens when your perimeter is breached or you fall victim to a supply chain attack?
Join Akamai and other security industry peers for a discussion on how to construct a comprehensive security framework to not only fight threats at the perimeter but also stop lateral movement of malware across your network.

Whether you’re wondering how to begin the Zero Trust journey or have already begun and want to know the next steps, this session is for you.


Discussion Points

How to defend against malicious code moving laterally across your internal network

What an ideal Zero Trust framework looks like in the real world

Practical tips for implementing microsegmentation and other key Zero Trust security technologies

  • Date : 17/08/2022

Register Now

Related Events

Bringing Your Passwordless Vision to Life

A Connex Group roundtable brought to you by Ping Identity

Driving ROI in the Quickly Changing World of TV Advertising

It’s 2022; consumer behaviours, business practices and media

How to proactively detect online scams

The growth and advancement in the online digital

GET IN TOUCH Have a question?