Applying a comprehensive, mature, and measurable zero-trust program

The best practices to implement to enable secure access for a remote workforce

Add bookmark

Many organizations have invested in security tools such as MFA, EDRs, MDMs, VPNs and more to mitigate phishing attacks. But security tools are used by real people, so they need to be supported with simple processes and great usability for maximum security efficacy. Duo’s APAC cybersecurity leader, Emir Trhulj, will interview Adrian Foo, CIO at Hynds. The two will discuss Hynd’s journey towards zero trust, including challenges, considerations and solutions discovered along the way. I...

RECOMMENDED