Zero-trust principles are reshaping cybersecurity strategy. The assumption is no longer that internal systems, users, or data sources can be implicitly trusted. Continuous verification, strict access controls, and granular monitoring are becoming standard practice.
This session explores how zero-trust thinking must extend beyond networks into the data itself. For CIOs, this means embedding governance into the core of security architecture.
Key areas of focus include:
- Applying zero-trust principles to data classification and access control
- Governing AI-generated or externally sourced data with uncertain provenance
- Strengthening metadata and lineage to support verification
- Continuous monitoring of high-value and sensitive data assets
- Reducing lateral risk through structured data segmentation
- Integrating governance policies directly into security controls
The session positions information governance as a structural component of zero-trust security — ensuring that data integrity, authenticity, and appropriate access are actively enforced rather than assumed.
June 9th, 11AM EST, 4PM BST, 5PM CET
Click the buttons below to register to watch the webinar or view our CIO Agenda homepage.