Zero Trust World, Zero trust

Stopping the unstoppable with ThreatLocker’s Cristiano Guerrieri

In this interview from Zero Trust World 2026, ThreatLocker's Christiano Guerrieri discusses storage control and visibility into where data resides, and more.

Analyze Exfiltration Pathing: Identify common modern methods of data exfiltration, such as social engineering, session hijacking (cookies), and the use of authorized software for malicious purposes.

Evaluate Application Permissions: Understand the risk associated with the "Full Access" model, where any software opened by a user can access everything that user has permission to see.

Implement Granular Controls: Learn to apply Zero Trust principles by using storage control policies to restrict data access to only pre-approved, necessary applications.

This segment is sponsored by Zero Trust World.

Visit https://securityweekly.com/ztw to see all of our coverage of this event!

Show Notes: https://securityweekly.com/ztw26-1

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

Related Terms

Asymmetric Warfare

You can skip this ad in 5 seconds