Jeannie Warner. Director of Product Marketing, CrowdStrike
Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
The basic principles of Zero Trust per NIST 800-207:
- Continuous verification of all entities trying to access a resource via dynamic policy
- Use of behavioral analysis, static hygiene information, and attack patterns combined with policies
- Analysis of information from the IT “stack” including user, workload, endpoint to create risk scores and threat graph
- Enforce segmentation and least privilege principles
Most organizations who have not started on Zero Trust blame the complexity, as they’re often managing over 130+ security tools. Adding more just makes the employees miserable.
But is there a simpler way?
Jeannie Warner, CISSP will share how CrowdStrike’s Zero Trust approach for endpoint, workload, and identity, along with the technical partnership with Okta, make Zero Trust simpler and more cost efficient to manage – fast.