
Never trust, always verify. That mantra – which forms the core of the Zero Trust model – now resonates with organizations around the globe. It has become the strategy of choice for keeping threat actors outside the perimeter.
But what happens when your perimeter is breached or you fall victim to a supply chain attack?
Join Akamai and other security industry peers for a discussion on how to construct a comprehensive security framework to not only fight threats at the perimeter but also stop lateral movement of malware across your network.
Whether you’re wondering how to begin the Zero Trust journey or have already begun and want to know the next steps, this session is for you.
Discussion Points
How to defend against malicious code moving laterally across your internal network
What an ideal Zero Trust framework looks like in the real world
Practical tips for implementing microsegmentation and other key Zero Trust security technologies