Session

Zero Trust or Zero Chance? Closing Identity Security Pitfalls

Traditional perimeter-based security exposes major weaknesses, as attackers exploit compromised credentials, legacy systems, and excessive privileges to move laterally, making identity the new frontline for Zero Trust strategies in 2026. In this session, we look at how to:

- Implement continuous authentication and dynamic risk-based access reviews using multi-factor authentication (MFA) for all identities, including service accounts and third-party integrations.
- Enforce least privilege policies, automating the removal of excessive permissions and segmenting access by user role, device, and context.
- Systematically inventory all identities (human and non-human) and integrate lifecycle management, automating provisioning, deactivation, and credential rotation.
- Continuously monitor and baseline normal behavior, using analytics and SIEM to detect anomalies and suspicious activity across all access events.

By applying Zero Trust principles "never trust, always verify", organizations shift from implicit trust to continuous validation, enforcing strict access controls and real-time monitoring for every user and machine identity.

Alistair Pugin

Microsoft MVP | Speaker | Blogger | Podcaster | Do-er@Celyntis

Cape Town, South Africa

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top