Digital transformation is causing an explosion of hyper-connected IT, IoT and IoMT devices and, with it, a greatly expanded cyber-attack surface. In such an environment, how can organizations begin to plan for a zero trust architecture beyond the managed users and workstations? In this important session, leaders will tackle a number of issues, including: how NIST defines Zero Trust and its 7 steps to get there; some common pitfalls to avoid; and why Zero Trust doesn’t stop at managed users and workstations.
- Brian Cayer, CISO, Tufts Medicine
- Omar Khawaja, CISO, Highmark Health
- Tamer Baker, VP of Global Healthcare, Forescout Technologies