LogRhythm’s CISO James Carder joined the organization recognizing he had an opportunity to improve the security of a security organization, but also architect and implement an architecture based on zero-trust that could be used as a model for organizations of similar size and IT characteristics. The path to Zero Trust is multi-phased, but once fully implemented, the LogRhythm team believes they will have the closest thing to a silver bullet for a streamlined IT organization, improved security and reduced risk of a breach.
Identity is at the heart of Zero Trust. The identities of your employees, the systems, the data they access, and their environmental context define the Zero Trust model. As a security software company, the last thing you need is a catastrophic security breach. We believe the Zero Trust model that puts identity at the center is the best approach to protect, detect, and respond to incidents before they become catastrophic breaches.
James CarderCISO, LogRhythm
In this guest blog, you’ll hear from James Carder and the details of how LogRhythm approached their path to Zero Trust. He provides his perspective on why it is the next evolution of their security model and why he chose to build it on an identity-centric model that completely transforms the current and legacy IT models.
In this webinar, LogRhythm’s CISO James Carder and Security Architect Erik Bartholomy, discuss their journey to identity centric zero trust and how they were able to prioritize scope and leverage existing technology, allowing integration with the current infrastructure in a way that available resources and budget could support.