Transcript: Embracing a Unified Identity-Centered Zero Trust Approach

June 14, 2024

With the ever-evolving threat landscape overlaid onto the continuous digital transformation underway at so many organizations across all sectors, a unified identity-centered zero trust security approach has never been more important, said Clay Rogers of CyberArk and Amit Chhikara of Deloitte.

“All your crown jewels are exposed through applications and platforms, and you’re trying to sell that data or use it for other business applications. You need a strategy that’s cohesive, centered around identity, to protect it in the right way,” Chhikara said.

“A lot of organizations are revisiting their identity tools and making a big investment in newer tools. The more that you can unify that approach, the easier you can make it on that organization,” Rogers said. In this video transcript with Information Security Media Group at RSA Conference 2024, Rogers and Chhikara also discussed:

- The critical components of an identity-centered zero trust approach, what customers need to look for, and how organizations can align their business and technology objectives when adopting such an approach;
- Recommendations for a comprehensive unified platform for a zero trust approach;
- The significance of an alliance between Deloitte and CyberArk.

Previous Article
New Secrets Management Capabilities: CyberArk Secrets Hub, CyberArk Conjur Cloud, CyberArk Conjur Enterprise, CyberArk Credential Providers
New Secrets Management Capabilities: CyberArk Secrets Hub, CyberArk Conjur Cloud, CyberArk Conjur Enterprise, CyberArk Credential Providers

Blog with new capabilities for managing secrets in AWS, Azure, GCP, multi-cloud and hybrid

Next Video
Showing Companies How to Achieve NIS2 Compliance
Showing Companies How to Achieve NIS2 Compliance

Understand more about the impact of NIS2 on your business