The trend to a Zero Trust model of information security is gaining momentum. Digital transformation and enterprise mobility are rapidly eroding the traditional perimeter-based model. What does this mean for protecting privileged access?
To explore these issues, we interviewed the CISO View research panel: a group of 12 leading security executives from Global 1000 organizations who have been steering their organizations towards a Zero Trust model. Based on the panel’s first-hand experiences around protecting privileged access while adopting Zero Trust approaches, this report is one of the first to offer practical and operational insights for CISOs and their teams.
This executive summary provides an overview of the key findings and recommendations of “The Protecting Privileged Access in a Zero Trust Model report”.