Zero Trust Security in the Connected Supply Chain
While the term Zero Trust is relatively new and very buzz-y, the Zero Trust approach – based on data segregation and perimeters – isn’t a new concept for IoT. But with the overall landscape becoming increasingly complex and the exponential growth in the number of machine identities that need to be secured and managed, it’s becoming an increasingly critical security consideration and best practice. Join this session to learn some key considerations in securing the evolving IoT landscape and how Entrust and Device Authority helped an organization on their journey to a Zero Trust IoT environment.
Room 1While the term Zero Trust is relatively new and very buzz-y, the Zero Trust approach – based on data segregation and perimeters – isn’t a new concept for IoT. But with the overall landscape becoming increasingly complex and the exponential growth in the number of machine identities that need to be secured and managed, it’s becoming an increasingly critical security consideration and best practice. Join this session to learn some key considerations in securing the evolving IoT landscape and how Entrust and Device Authority helped an organization on their journey to a Zero Trust IoT environment.