Skip to content

What we’re about

Practitioners CISO, CIO, VP of Security, Cloud Security who are interested in cybersecurity technology, products, services - around Zero Trust. Engineers who are interested in creating and implementing Zero Trust technology.

The Zero Trust model first introduced by Forrester Research, works on an assumption that any component irrespective of where it resides with respect to the perimeter is untrusted and can be malicious. It works on a model of “always verify, as if untrusted”.

Group links

Organizers

Members

95
See all
Photo of the user venkat.d
Photo of the user Ajay Nilaver
Photo of the user Chris Casel
Photo of the user Adi R
Photo of the user Deep
Photo of the user Member ID: #38222342
Photo of the user Alma Paul
Photo of the user Yiwen Zhu
Photo of the user Sumanth
Photo of the user Sanjay Gupta
Photo of the user Hemanath baskaran
Photo of the user john