Applying a comprehensive, mature, and measurable zero-trust program

The best practices to implement to enable secure access for a remote workforce

Add bookmark

Many organizations have invested in security tools such as MFA, EDRs, MDMs, VPNs and more to mitigate phishing attacks. But security tools are used by real people, so they need to be supported with simple processes and great usability for maximum security efficacy.

Duo’s APAC cybersecurity leader, Emir Trhulj, will interview Adrian Foo, CIO at Hynds. The two will discuss Hynd’s journey towards zero trust, including challenges, considerations and solutions discovered along the way. In order to make progress towards zero trust security, it’s critical to get everyone on board. This session, shares the best practices implemented to enable secure access for a remote workforce, providing the best experience for productivity without compromising on security.

Watch this session to learn more about:

  • Zero Trust capabilities for the hybrid workforce, such as security policies.
  • Securing against phishing attacks with strong multi-factor authentication and device trust.
  • Creating a more secure approach to network security in remote workforces and cloud computing environments.
     

Recommended