Zero Trust Security Framework for Financial Services

08.45 am to 10.15 am CT,
13 June 2024

Zero Trust Network Access

Minimizes the attack surface by limiting access to only authorized users and devices.

Identity & Access Management (IAM)

Strong authentication mechanisms such as multi-factor and biometric authentications before granting access to sensitive data.


Divide the network into smaller, isolated segments, reducing lateral movement of threats and containing potential breaches.

Encryption and Data protection

Prioritize end-to-end encryption and leverage encryption technologies and data loss prevention (DLP) solutions.

Endpoint security

Implementing EPP and EDR solutions ensures device security and compliance with organizational policies before network access.

Policy-based access control

Access policies adapt based on user roles, behavior, device status, and resource sensitivity, ensuring dynamic access control.

A substantial 83% of security professionals consider Zero Trust a vital part of their security strategies

The global zero trust market is predicted to grow significantly from USD 31.1B to USD 67.9B by 2028, with a strong 16.9% CAGR.

Never trust, always verify

Enhanced security posture and compliance

Threat intelligence

Continuous monitoring and analytics

Reduced attack surface

Remote access protection

Exclusive Partners & Sponsors

Knowledge & Innovation Partner

Technology Partner


13 June 2024 (08.45 am to 10.15 am CT)
08:45 am
Aganda 1

Introduction of Speakers

Nitin Naveen, Vice president-Innovation Strategy, AICorespot


08:50 am
Aganda 6

Fortifying Finance: Zero Trust Security Solutions

Panel Discussion
– Brett Fish, Associate Vice President, InfoVision (Moderator)
– Lighting speaker 2
– Lighting speaker 3
– Lighting speaker 4
– Lighting speaker 5


10:10 am
Aganda 1

Thank you note and conclusion of event

-by Nitin Naveen, Vice president-Innovation Strategy, AICorespot