Welkom op de nieuwe website van IIA Nederland. Bekijk hier de walkthrough om je gegevens te controleren.

Download

GKB | Cybersecurity Part 3: Establishing a New Zero-trust Boundary

Publicatie 16/12/2024
GKB | Cybersecurity Part 3: Establishing a New Zero-trust Boundary

Cybersecurity

Part 3: Establishing a New Zero-trust Boundary

It should be a baseline requirement for every organization to have processes and controls in place to keep their networks secure. However, as technology has advanced and networks have grown larger and almost unfathomably complex, the standard for what is needed to constitute a secure network has changed. One of the most important changes lies with the transition from a location-centric security model to a more data-centric one. We call this model “zero trust.”

As an IIA member, you can download the report here.