Get unparalleled visibility into identities, accounts, and privileged access — all in one interface.
Learn More Learn MoreGet a closer look inside the BeyondTrust identity & access security arsenal.
Learn More Learn MoreFind out how customers & analysts alike review BeyondTrust.
Learn More Learn MoreOur biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreSearch the knowledge base for answers to FAQs & more.
Learn More Learn Morewith Eric Lee, Partner, Risk Advisory, Deloitte Southeast Asia
Over the past few years, Zero Trust has become one of the buzzwords of the cyber security industry as organisations look to better secure their systems and networks in the wake of increased remote workers.
Adopting a Zero Trust security model is recommended by cyber security experts such as the US government agency, the Cybersecurity and Infrastructure Security Agency, to strengthen cyber defences against commonly exploited weak security controls.
But with so many people talking about Zero Trust has come confusion: what it is, what it isn’t and how In this webinar we will unpick the Zero Trust knot. We will also discuss how modern PAM solutions help implement least privilege, a key feature of Zero Trust.
Watch Scott Hesford, Director of Solutions Engineering, APJ, BeyondTrust and Eric Lee, Cyber Risk Partner, SEA, Deloitte, as they make sense of Zero Trust and help dispel some of the myths around the term.
By attending you will learn:
Eric Lee, Partner with Deloitte Risk Consulting Services practice, has over 20 years of industry experience in business IT operating model, enterprise system development, and technology risk and security management. Eric leads the Digital Identity practice in SEA and primarily serve clients in the financial services, public service and healthcare sectors. His areas of expertise are Cybersecurity, IT program and change management, enterprise software design and implementation, and IT governance, risk and compliance.
Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA Technologies and other large enterprises in Australia and New Zealand. A trusted cyber security advisor to enterprise customers, his experience spans across several industries such as banking, insurance, energy and utilities, in addition to state and federal governments. At BeyondTrust, Mr Hesford is an essential contributor in the regional security engineering department, helping enterprises and government agencies improve their security posture against internal and external threats.