Why Identity is the New Security Perimeter

Register Now

Fill out this form to register for the digital event

*required fields

Why Identity is the New Security Perimeter

On Demand

Identity is the New Security Perimeter

With traditional perimeter-based protection architectures becoming a thing of the past, an identity-centric approach of Zero Trust is the way to move forward. There is often a misconception that identity is only about the human factor. However, when we’re talking about Zero Trust, identity is also about your device identity, location identity, application identity, and your conditional access engine.

Organisations need to align their architecture from an identity-centric point focusing on three fundamental principles.

  1. Verify explicitly – Validate trust of users, devices, applications, and more using data/telemetry
  2. Use least privileged access – to limit the impact of any given compromise
  3. Assume breach – Assume that attackers will succeed (partially or fully) and design accordingly 

To discuss how identity is becoming a new security perimeter, we are joined by two experts, Abbas Kudrati, APAC Chief Cybersecurity Advisor at Microsoft and Saurabh Kumar, Group Security Manager Authentication & Directory Services at NAB.

They’ll share their insights on:

  • The three fundamental principles of Zero Trust
  • Key challenges with implementing identity as a security perimeter and how to overcome them with a risk-based approach
  • Key challenges with aligning identity and permission in a multi-cloud environment, and how to centralise the attributes associated with identity
  • How Microsoft can support you throughout your journey

Register your spot now.

If you’d like to check out the other sessions in this series, click here: Zero Trust series.

https://info.microsoft.com/AU-ZTF-WBNR-FY23-08Aug-30-Why-Identity-is-the-New-Security-Perimeter-SRDEM118403_LP03-Thank-You---Standard-Hero.html