TR16 INCYBER What identity and access management in a Zero Trust architecture
As more organizations adopt an identity-driven approach to security, the focus is shifting from network security and other traditional controls to IAM, making it essential for cybersecurity and operational ef- ficiency. While Gartner observes an increased role for IAM in security programs, CISOs must focus on strengthening and leveraging their ‘identity fabric’ and implementing solutions that ensure IAM capabilities are well-positioned to support the breadth of the overall security program. What are the key elements of successful identity and access management in a zero trust architecture? What is the contribution of AI? How can compliance be ensured?
Allez à la source