5/16 (Thu.) 15:45 - 16:15 7F 701F

Zero Trust Security: 6 Implementation Challenges and Solutions

Zero Trust Security prioritizes ongoing verification before granting access. However, its implementation encounters obstacles such as legacy technology, budget limitations, integration complexities, and a lack of awareness. Explore strategies to surmount legacy tech, manage budgets, address integrations, and empower your team with Zero Trust principles.

Kenneth Lo
SPEAKER
Senior Product Manager
Version 2

TOPIC / TRACK
Zero Trust Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701F

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Zero Trust Architecture
Identity Management
Network Visibility