As the “work-from-anywhere” model plays a larger role in shaping enterprise IT requirements, so too is the importance for organizations to get ahead of the adversaries, by implementing zero-trust security strategies and upgrading their access control and identity management capabilities. Learn how government and security leaders are approaching zero-trust architectures; how they’re securing the endpoint and establishing trust in unmanaged devices; and how they’re using data and behavior analytics to defend against advanced threats.