August 21 - 23, 2019
Marriott Georgetown, Washington, DC
Zoe Lindsey, Advocacy Manager at Duo

Zoe Lindsey

Advocacy Manager

Day Two: Thursday, August 22, 2019

Thursday, August 22nd, 2019

2:45 PM Zero Trust Access: Five Steps to Securing the Extended Enterprise

 The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.