Senior Sales Engineer
Thales Trusted Cyber Technologies
The numbers don’t lie – whether internal or external, breaches are inevitable. Supply chain attacks, insider threats, ransomware, malware, phishing, identity/credential theft—attack vectors are targeting agencies from all angles. In today’s environment, the core of any security strategy needs to shift from “breach prevention” to “breach acceptance”. And, the best way to prevent your agency from becoming victimized is by adopting a zero trust approach to security while establishing strong supply chain risk management plans.
This webinar will discuss what agencies need to do before their networks are compromised. Discussion topics will include:
- Tips for adopting a zero trust architecture
- Key principles for protecting data from the data center to the cloud
- Supply chain risk management requirements