This resource is no longer available
Protecting Privileged Access In A Zero Trust Model
The trend to a Zero Trust model of information security is gaining momentum. Digital transformation and enterprise mobility are rapidly eroding the traditional perimeter-based model. What does this mean for protecting privileged access?
To explore these issues, we interviewed a group of 12 leading security executives from Global 1000 organizations who have been steering their organizations towards a Zero Trust model. Based on the panel’s first-hand experiences around protecting privileged access while adopting Zero Trust approaches, this report is one of the first to offer practical and operational insights for CISOs and their teams.