Zero trust is a strategic approach that replaces implicit trust with continuously assessed explicit trust. It is based on identity and context that is supported by security infrastructure that adapts to an organization’s risk appetite to improve the security maturity. It can be confusing when used without context, and often abused in vendor marketing to imply improved security. Security and risk management leaders pursuing a zero-trust strategy must focus on key projects to demonstrate value quickly by targeting the highest risks in their environment first. This webinar will highlight 7 effective steps for implementing zero trust network access.
The presenter of this session is Glenn Schoonover with Gartner’s Security and Risk Management Leadership Partner team. His Cybersecurity experience spans a variety of sectors. He served 14 years in the Army in a wide variety of command and staff positions. He completed his military career as first Chief of Network Security at the Pentagon after establishing the Army's first Computer Emergency Response team. He then served in several startups and spent time at Microsoft as a Federal Cyber Security Advisor. He was also the CISO for the State of Vermont, as well as the State of Oklahoma, prior to coming to Gartner.
He is experienced in leading organizations to build, refine, and mature their Information Security Programs. He has specific experience in developing, assessing, and managing information security program compliance with NIST 800-53,and 800-171.
Date & Location
Date & Time