YoVDO

The Hole in Zero Trust Strategy

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!

Presenter: Matthew Chiodi, Chief Trust Officer, Cerby

Everyone is talking about Zero Trust because it works when fully deployed across all applications. IBM recently found when Zero Trust is deployed holistically, the cost of a breach is reduced by 43%! But, if 61% of cloud applications don’t support identity standards like SSO, how will can they be included in a Zero Trust strategy? This webcast will use the latest threat research to reveal what unmanageable applications are, how to quantify the risk they add to the business, and how to apply Zero Trust principles.


Syllabus

Webcast: The Hole in Zero Trust Strategy


Taught by

RSA Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network