PLACEHOLDER DATA FOR PI - DO NOT DELETE
“In Microsoft’s approach to Zero Trust, we don't assume any identity or device on our corporate network is secure. We continuously verify it,” Patton says. “This allows us to reduce the risk in our environment by verifying those identities and validating device compliance before granting the access.
Patton knows that Microsoft wasn’t born in the cloud either, and he’s here to provide guidance and discuss topics like value of network segmentation, the balance between security and productivity, and strategies for supporting identity and device health.
The most critical piece of advice is to start simple.
“First and foremost, understand what your environment and the telemetry to make sure you understand the risks and what it is you're trying to mitigate,” Patton says. “If you haven't already done it, start migrating identities to Azure Active Directory or some other connection point to get to the point of modern identity."
© 2021 Microsoft Corporation. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.