Are you out of your Trust but Verifying Mind?
Zero Trust, built on the principle of “never trust, always verify,” has become a global strategic initiative that major organizations are adopting to prevent successful cyberattacks. Much has been written about the topic of Zero Trust BUT is it a security buzz word or a true effective security strategy?
This information session will include:
- -What is Zero Trust & how does it work?
- -What is the 5 step deployment model?
- -Why would I adopt Zero Trust?
- -How can I adopt Zero Trust for my organization?
O365 Cloud Security
Anatomy of a Hack
Cloud Service Providers Webinar
NEIN-ISSA Holiday Networking Event
Rolling Cyber Security into Risk Management
IoT - from the Edge, through the Fog, and to the Cloud
Northeast IN Year End Celebration
Lifeline Data Center Tour
Privileged Account Management: A Sprint Approach
Securing the Internet of Things
The who, what, where and why of SIEM
Northeast Indiana ISSA Holiday Celebration 2017
Understanding Penetration Testing
IT and Finance: Bridging the Knowledge Gap
ISSA NE IN - Social
Compliance and Regulations
Preventing Data Disasters
20 Critical Security Controls
Ransomware and Drinks
Meet the President of ISSA Int'l
Hyper Converged Solutions
3D Printing Demo