Zero Trust Architecture: The Defacto Network Segmentation Approach

Posted on in Podcasts

Agility is not a strategy, and Zero Trust is not a product you can buy. In a Zero Trust approach as identity becomes more important than ever, managing the lifecycle correctly is critical, during provisioning, use as well as destruction. These are some of the reasons why Zero Trust architecture is becoming the defacto segmentation approach in our digital-first world. Interrelated are the opportunities in both Edge Computing and DevSecOps to help businesses differentiate products and services by transitioning to more collaborative and risk-based security. Join us as we discuss Zero Trust, DevSecOps and Edge Computing with two industry experts who will explore the ways in which these approaches to customer-centric transformation can help businesses stay competitive.

Diana Kelley

CTO and Co-Founder, SecurityCurve

Phoram Mehta


Kacy Zurkus

Content Strategist, RSA Conference

DevSecOps & Application Security Security Strategy & Architecture

business continuity & disaster recovery cloud security endpoint security secure coding security architecture zero trust

Share With Your Community