
OVERVIEW:
Modern Cyber threats demand a modern response. Assume breach and secure your people, devices, applications, and data with Zero Trust. Not a point solution, this architecture will ensure your Organisation’s digital estate is safe today and into the future.
-
What are the components of a Zero Trust architecture?
-
What each component means?
-
Where to start?
Liquid IT has extensive experience in the cloud, connectivity and cyber security space. Zero Trust is an architecture that encompasses elements across all three towers to deliver a dramatic increase in cyber security posture, along with enhanced user experience. Traditional security enforcement is no longer sufficient to protect an organisation as threats have increased in sophistication and frequency. It is therefore necessary to explicitly verify identity, apply principals of least privilege, deny access by default, and assume breach.
This is a significant shift from trusting the inside of the network and allowing access by default to private applications and resources. Without a pragmatic approach this shift can quickly become overwhelming. Liquid can offer guidance to Organisations on their journey towards a Zero Trust architecture. Acknowledging that there is no “one size fits all” solution, Liquid works with best of breed providers to deliver zero trust to all aspects of an Organisations digital estate. We offer a range of services from consulting to full managed services.
VENUE
Address
11 Bolton Street, Wellington Central, Wellington 6011, New Zealand
Time
Food & Drinks
Food & Drinks will be provided by Liquid IT & the venue as part of this session. Drinks will be served on arrival with food coming out from 12:30pm - 3:00pm
