How Government Can Use Identity Controls to Meet Zero Trust Goals – Best Practices. Presented by KeyData's CTO, Brian Read
This webinar has ended. To get the details of the presentation, simply complete this short form.
While information security has always been a priority for all levels of government, the increased adoption of cloud computing, the acceleration of hybrid work and digitization of services has made traditional security architectures ineffective or even obsolete.
Zero Trust is a set of principles that can help your organization to develop a modern, agile, effective security architecture. At the center of any Zero Trust initiative are your identity controls and understanding how these controls are applied to a Zero Trust architecture is a key first step in securing your organization.
Even as Zero Trust becomes increasingly referenced in project requirements and client interactions, many government agencies find it challenging to understand and implement zero trust principles. So, what does it mean? How can your existing identity controls be leveraged to help meet zero trust? How can you measure the success of your IAM solution?
Join KeyData for this interactive webinar to understand the practical definition of Zero Trust along with examples and best practices illustrating why identity controls are critical to meeting your infosec goals.
1. Understanding Zero Trust at both the Executive level and Architect level
2. How to plan for and align your identity program with Zero Trust principles
3. Some real-world examples of using Identity controls with Zero Trust design principles to modernize your security architecture
About Brian Read
Brian’s extensive experience in the Canadian IT Industry has led to the development of a broad skill set. With over 20 years focused on managing and growing security consulting practices, Brian has led large Canadian InfoSec projects in the Federal Public Sector, Energy Industry and Financial Services Sector.
Since joining KeyData as the CTO, Brian provides a technical voice to the KeyData senior leadership team. This position also allows Brian to work with strategic customers on tasks that may include everything from helping them reshape their strategies around identity in the public cloud to developing custom automation and product integrations in several programming languages.
His unique experience as both a defender and an attacker has allowed him opportunities to speak at events from ISACA, ISF, SecTor, EDIST and MISA among others.