Zero Trust Security prioritizes ongoing verification before granting access. However, its implementation encounters obstacles such as legacy technology, budget limitations, integration complexities, and a lack of awareness. Explore strategies to surmount legacy tech, manage budgets, address integrations, and empower your team with Zero Trust principles.
TOPIC / TRACK
Zero Trust Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701F
LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Zero Trust Architecture
Identity Management
Network Visibility
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。