CISO Workshop Module 3: Identity and Zero Trust User Access

Learn how to advance zero trust with your identity and user access strategy to better protect corporate data inside and outside your network perimeter.

Part 1: Identity and Zero Trust History (9:33)

Part 2: Zero Trust Definition and Models (15:37)

Part 3: Strategy and Priorities (9:54)

Part 4: Account Security: Measuring Cost of Attack Password-less Authentication (13:11)

Part 5: Zero Trust User Access Reference Architecture (8:42)

Part 6: Build an Identity Perimeter (13:57)

Part 7: Identity System Security (3:37)

Part 8: Lowering Risk using business-to-business and business-to-customer (4:47)