The Inner Circle

 View Only
  • 1.  The Journey to Zero Trust starts with Secure Identity

    Posted Jul 18, 2022 06:10:00 AM

    Identity is the core of a Zero Trust strategy. With the perimeter moving to the identity layer, people become a critical component of the Zero Trust ecosystem. The next webinar in the Zero In webinar series explores:

    • The key role that identity plays in a Zero Trust strategy
    • How you can successfully integrate identity into your existing security practice
    • Why adopting identity-first security will help you realize your Zero Trust goals

    Learn more and join the webinar here → The Journey to Zero Trust starts with Secure Identity

    #cloudsecurity #ZeroTrust #riskmanagement

    BrightTALK remove preview
    The Journey to Zero Trust starts with Secure Identity
    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: With the perimeter moving to the identity layer, people become the critical component of the Zero Trust ecosystem.
    View this on BrightTALK >


    ------------------------------
    Orbert Reavis
    Circle Guide
    CSA
    ------------------------------


  • 2.  RE: The Journey to Zero Trust starts with Secure Identity

    Posted Jul 20, 2022 02:31:00 AM

    Identity is the core of a Zero Trust strategy. {agreed} With the perimeter moving to the identity layer {NO; a perimeter implies a locus-of-control problem} Try: With risk-based control reliant on the identity layer people {Aargh! it's not just people, it's entities and trustThe ability to consume attributes from entities with a known level of trust become a critical component of the Zero Trust ecosystem. {FYI: Entities - People, Devices, Organizations, Code & Agents}

    IMHO: Should read - "Identity is the core of a Zero Trust strategy. With risk-based control reliant on the identity layer, the ability to consume attributes from entities with a known level of trust become a critical component of the Zero Trust ecosystem."



    ------------------------------
    Paul Simmonds
    CSA UK Chapter
    ------------------------------