Event details

2022-11-30 11:00:00
2022-11-30 12:00:00

In partnership with:

About this webinar:

Most organisations, confronting growing cyber security threats and the rise in remote working, are aspiring to a Zero Trust model. Nevertheless, many are simply paying lip service.

Widely regarded as the best approach for protecting organisations, with significant gains to visibility, simplicity, and security, Zero Trust is an architectural framework rather than a one-off purchase. “Never Trust, Always Verify” is playing a key role in enabling enterprises to support and authenticate users.

However, retrofitting it around existing network and data architecture is complex and determining where to start can be a challenge. The journey to Zero Trust may start with identifying critical assets and risks to them, and requires a holistic iterative approach comprising hardware, software, processes, and people. Zero Trust further encapsulates other frameworks such as SASE and SDP.

Organisations must strike a balance between security and ease of collaboration. Creating frictionless, secure experiences for users is all the most important as dispersed workforces become the norm and the security perimeter continues to expand.

Organisations continue to find challenges as they move to the cloud and while traditional open and collaborative global trading methods change. Trade barriers between nations geo-politics and fear of IP theft has created the need for Zero Trust. Hefty fines and imprisonments await those failing to protect critical data from leaving a country’s compliance and regulatory mandate.

IT leaders must stop threats moving through networks and control data usage as well as access, all while demonstrating the business case for new cyber security investments.

Legacy tech creates hurdles for Zero Trust strategies and many organisations are continuing to grapple with a patchwork of unintegrated technologies – the need for strategic planning is palpable. Are projects falling short? What’s the best way to implement Zero Trust? What infrastructure is needed? What business impacts due you face if your adversary steals your IP or breaches your privacy and regulatory data? And what does your journey look like to get a SASE/Zero Trust architecture in place?

This webinar, featuring bespoke Computing research, uncovers best practices when it comes to establishing Zero Trust. It will reveal where organisations are at in their Zero Trust plans, how IT decision-makers are responding to modern security challenges, and whether organisations are ensuring the easy wins are being realised early on. Ultimately, we ask what should your Zero Trust technology end goals look like?


Alexandra Willsher

Alexandra Willsher

Sr GSI Sales Engineer – EMEA, Forcepoint

View Bio

A career within Network and Cyber Security with the Financial Services Industry, Alexandra now uses the experience gained from protecting  and securing global estates to help inform and shape the strategic discussions and requirements for Forcepoint GSIs.  Having worked both in Operations and CISO led functions, her view of security is that there is no one silver bullet to all the problems currently faced in Cyber, and any successful approach and implementation requires co-operation and assistance from every part of a business.  The most successful security enables a user and does not hinder.

John Leonard

John Leonard

Research Director, Computing/The Channel Company EMEA

View Bio

John is Research Director at Computing and Delta, where he tracks developments in the IT market and monitors technology choices made by IT leaders.

Anne Cockshott

Anne Cockshott

Technology Analyst, The Channel Company EMEA

View Bio

Anne works with the commercial technology content team producing whitepapers, reports, webinars, multimedia digital experiences, videos, and articles on the latest industry trends. Formerly, Anne was a science writer for the American Institute of Physics.



Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.