On-Demand Webinar

Extend Zero Trust with Deception - based Active Defense

Over the last two years, there has been a dramatic increase in human-operated threat actors using stealthy tactics, social engineering, and compromised identities to slip past security controls and breach well-defended organizations.

Even as organizations continue to transition to a Zero Trust architecture, they remain vulnerable to identity-based threats, malicious insiders, and lateral movement.

Security teams need a proactive approach to stopping these advanced threats.

Join us for an hour of learning as we talk about how you can extend Zero Trust with Deception. We will cover:

  • What is Deception and why it’s effective
  • How Deception fits into a zero trust architecture
  • How Deception detects compromised users, lateral movement, and defense evasion techniques like EDR bypass
  • A live attack simulation and how deception detects and disrupts the attack at different stages

Speaker:

Casey Sisson

Sahir Hidayatullah
Vice President - Active Defense at Zscaler

Watch Now