WhoshouldIsee Tracks

Tech Talk Tuesday: Trusting Zero Trust in 20 minutes

Zero Trust is a critical security framework for defending against today’s advanced threats. In this focused 20-minute technical session, our CTO, Josh Neame, breaks down what Zero Trust really means in practice, why traditional perimeter-based models no longer suffice, and how to implement Zero Trust to consolidate existing tools, stay well within budget, and improve user experience and efficiency.

We covered:

  • Core principles of Zero Trust – continuous verification, least privilege, micro-segmentation.
  • Architectural components – identity, endpoint, network, application, and data security layers.
  • Key drivers for adoption – remote work, cloud migration, ransomware, insider threats.
  • Implementation roadmap – from assessment to full policy enforcement.
  • Common pitfalls – and how to avoid them.

Who should attend

Security architects, IT leaders, SOC teams, and anyone responsible for protecting critical infrastructure or sensitive data.

Takeaway

Leave with a clear understanding of how you could apply Zero Trust in your own environment to reduce attack surface, support remote workers, meet compliance, and prevent lateral movement.

Register Now

Once submitted, a link to the on-demand recording will be sent to your inbox.