Time: 2:30 PM – 3:00 PM
Evan Pelecky, Product Manager, Cryptographic Key Management, Thales TCT
The principles of zero trust eliminate the binary trust/don’t trust approach applied to users and assets in yesterday’s on-premises, perimeter-centric environments. A good zero trust action starts with focusing on what needs to be protected—the files containing sensitive information—and applying the appropriate form of protection no matter where the data happens to reside. This must happen automatically; sensitive information should be identified as soon as it enters an organization’s ecosystem and should be secured with policy-based protection that lasts throughout the data lifecycle.
Data encryption and key management are fundamental zero trust tenants and give organizations complete control over sensitive data. Per zero trust best practices, access to protected data can be granted or revoked at any time, and all activity is logged for auditing and reporting.
Attend this session to learn how to implement encryption and key management best practices into your zero trust architecture with CipherTrust Data Security Platform.