Focus & Features
Based on the data gathered by cybersecurity company Imperva in 2021, 50% of the attacks are Data Leakage followed by Remote Code Execution and the numbers will continue to increase. The first and second lines of defense of various organizations are exhausted in analyzing risks and putting in controls to firm up the security posture.
But we must not forget that the role of the 3rd line of defense is crucial to continuously assess the effectiveness of the controls that are put in place. With the evolving technique, tactics and procedures of the adversaries, it is essential to understand, strategize and operationalize Zero Trust as a framework. as a discipline and strategy to combat the adversaries. But continuous assurance is essential, hence, auditors must be able to be equipped with the fundamentals of the Zero Trust and its applicability and learn how they can perform a complete review to help their respective organizations identify gaps that were not identified during the implementation of the Zero Trust.
Zero trust networking is a concept for secure network connectivity where the initial security posture has no implicit trust between different entities, regardless of whether they are inside or outside of the enterprise perimeter. Least-privilege access to networked capabilities is dynamically extended only after an assessment of the identity of the entity, the system and the context. The learnings from Zero Trust is not only confined with the technology and cybersecurity practitioners. It must be cascaded to the assurance and compliance people for them to effective provide assessment and certain level of assurance to the business..
What You Will Learn
Who Should Attend
IT Auditors, Beginners in IT Audit/IT Risks
Virtual set-up/via ZoomSee route