Sign-Up to Access Recording
How to Implement Zero Trust with Remote Workers
In this webinar, we're going to talk through a few of the common concerns organizations are having whilst adapting to remote working - namely, how can I limit the risks of privilege abuse and insider threats?
We'll talk about the best methods for ensuring that are able to implement a zero-trust policy, including:
- How to locate your most sensitive data.
- How to see which users have access to this sensitive data.
- How to spot users with excessive permissions that might lead to privilege abuse.
- How to spot changes to permissions that could put you at risk.
There will be time at the end of the webinar for questions and answers.

Danny Murphy
Head of Technical Delivery

Aidan Simister
CEO at Lepide