×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

The CISO View Executive Summary: Protecting Privileged Access in a Zero Trust Model

March 19, 2021

The trend to a Zero Trust model of information security is gaining momentum. Digital transformation and enterprise mobility are rapidly eroding the traditional perimeter-based model. What does this mean for protecting privileged access?

To explore these issues, we interviewed the CISO View research panel: a group of 12 leading security executives from Global 1000 organizations who have been steering their organizations towards a Zero Trust model. Based on the panel’s first-hand experiences around protecting privileged access while adopting Zero Trust approaches, this report is one of the first to offer practical and operational insights for CISOs and their teams.

This executive summary provides an overview of the key findings and recommendations of “The Protecting Privileged Access in a Zero Trust Model report”.

Previous Flipbook
Gartner Report: Top 10 Lessons Learned From the SolarWinds Attack
Gartner Report: Top 10 Lessons Learned From the SolarWinds Attack

Top 10 Lessons Learned From the SolarWinds Attack* provides high level guidance for security and risk manag...

Next Article
Different IoT Breach, Same (In)Security Story, Broader Consequences
Different IoT Breach, Same (In)Security Story, Broader Consequences

“I always feel like somebody’s watching me… Tell me is it just a dream?” It may have been a dream in 1984 w...