What we're about

Practitioners CISO, CIO, VP of Security, Cloud Security who are interested in cybersecurity technology, products, services - around Zero Trust. Engineers who are interested in creating and implementing Zero Trust technology.

The Zero Trust model first introduced by Forrester Research, works on an assumption that any component irrespective of where it resides with respect to the perimeter is untrusted and can be malicious. It works on a model of “always verify, as if untrusted”.

Past events (4)

Cloud and Container Security: Where are we headed

Online event

Cloud and Container Security: Where are we headed

Online event

Zero Trust and Identity in the Enterprise

3350 Thomas Rd

Photos (10)