Leveraging Identity and Access Management for Zero Trust presented at ThreatIntelligenceSummit 2020

by Wolfgang Goerlich,

Summary : In the modern enterprise managing both direct- and cloud-hosted resources, identity for your users is much more complicated than a directory record. A comprehensive IAM strategy should cover all the resources your business relies on regardless of where they are, and it is this challenge that the zero-trust methodology is meant to address. Join Duo's Advisory CISO Wolfgang Goerlich for a focus session on zero-trust principles, where they can be applied in both local and hosted environments, and what to consider when planning your identity and access management strategy.