Session: The What, Why and How of implementing a Zero Trust Security Model
A Zero Trust Security Model employs concepts beyond the traditional confines of network security. Trust is not an entitlement. Access needs to be gained through a comprehensive process. Let’s explore Zero Trust and how enterprises can leverage security solutions as a foundational step in their journey.
- Unlearn and learn is the key where many women join under one community to share learnings and wisdom.
- Security is a journey not a destination!
Sophia has worked extensively in the Cybersecurity domain, assisting customers improve their cybersecurity posture by assisting them implement Zero Trust architecture projects, assist customers launch offensive security programs like Bug bounty programs.
She is currently working with InstaSafe as Customer success growth associate manager.She is currently contributing immensely to strengthen the secure posture of InstaSafe Zero Trust solutions and protect the company's assets from external hackers through SafeHats program initiative. Her contribution and the knowledge is always highly valued in the field.Her career objective is to obtain a crowning status in the domain of cybersecurity and demonstrate skills and talents linked with her profile.Before joining InstaSafe,she has worked with leading organisations like IBM, Wipro, AWS, Microsoft creating world class, award winning partnerships in evangelising cybersecurity initiatives worldwide.
Sophia is the chief community builder of Women in Cyber community, a community which fosters awareness starting from Teenagers to CxO’s and working towards building gender equality in the world of cybersecurity.Besides,she is also a part of the various women in cybersecurity community groups like BBWIC,InfoSecDiversity,ISACA Bangalore Chapter,CSA Bangalore.