Securing the World's Transactions Through Zero Trust
Hear from industry experts on how businesses can implement Zero Trust at scale by prioritizing a never trust, always verify approach to their cybersecurity strategies.
Hear from Greg Touhill the Director of the CERT Division at Carnegie Mellon's Software Engineering Institute on how organizations can misplace trust in third-party vendors and should place trust in people, processes, and technology based on an assessment of risk and resilience.

Hear more from Chuck Brooks, a professor at Georgetown University and cybersecurity consultant who clarifies the importance of identity and risk management for achieving Zero Trust at scale.

Finally, tune into Tony Scott, CEO of Intrusion Inc. who expands on how businesses must stay current and develop practices and defenses that require more resources to combat cybersecurity threats that don't play by the same rules.
