×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

The CISO View: Protecting Privileged Access in a Zero Trust Model

March 18, 2021

The trend to a Zero Trust model of information security is gaining momentum. Digital transformation and enterprise mobility are rapidly eroding the traditional perimeter-based model. What does this mean for protecting privileged access? As the perimeter dissolves, how can organizations protect access to their most valuable resources – data, applications, and infrastructure – on-prem or in the cloud?


To explore these issues, an independent research firm, Robinson Insight, interviewed the CISO View research panel: a group of 12 leading security executives from Global 1000 organizations. They have been steering their organizations towards a Zero Trust model and have worked through some of the challenges that other practitioners are likely to encounter. 


Additionally, Robinson Insight surveyed 100 security executives from large enterprises on the value of Zero Trust and the sense of urgency for securing privileged access. The survey results are available on The CISO View 2021 Survey: Zero Trust and Privileged Access report.

Previous Whitepaper
How CyberArk Can Help Meet Criminal Justice Information Services Compliance
How CyberArk Can Help Meet Criminal Justice Information Services Compliance

CyberArk helps organizations comply with CJIS requirements to govern the access, use, and protection of sen...

Next Whitepaper
AWS Cloud Playbook: Identity Security and Cloud Compliance
AWS Cloud Playbook: Identity Security and Cloud Compliance

Learn how to meet identity security compliance t to secure your critical data in an AWS cloud environment.