As the level of incidents, events and breaches continues to grow by double digits year over year, it is now a mathematical inevitability that one or more of your third-parties will be a statistic. Learn how Zero Trust is a strategy and set of principles that assumes a breach will occur and creates architecture and operations around controls. Given the increased likelihood of a vendor breach, adopting a Zero Trust approach focused on third-party risk can greatly reduce risk for your organization.
Learning Objectives:
Explain why Zero Trust strategy is ideal in third-party risk and how it lends itself well to the staged journey of most Zero Trust deployments.
Utilize an OSI model type to demonstrate the overlap of Zero Trust and third-party risk.
Recognize that Zero Trust is a strategy and set of principles that assumes a breach will occur and creates architecture and operations around controls.