Virtual event

Zero trust security model

Jump to section

Webinar | Tech Journey Security

Discover the zero trust security model — a modern framework that challenges the "trust but verify" paradigm with a more rigorous "never trust, always verify" philosophy.

We’ll delve into the core principles of zero trust, including identity verification, least privilege access, and continuous monitoring, to help both technical and non-technical audiences understand how zero trust strengthens organizational resilience across networks, devices, users, and workloads.

Learn from our experts below


Kenneth Peeples

Tech Lead - AI TDP Technical Decision Points, Red Hat

Mike Epley

Chief Architect and Security Strategist, Red Hat

Security Tech journey Hub

Stay up to date with the latest sessions and explore other Tech journeys that match your interests.