Data is the main target of attackers: it is stolen, destroyed, and used for extortion. Digital transformation and work from anywhere have expanded the places where data lives and the paths through which people access it. The talk shows why data protection starts with the user and how zero trust principles, browser isolation, DLP, and CDR help.
Zero trust in practice: verify the sender, the content, and the intent
Data now flows between the company’s own data center, cloud applications, and third‑party infrastructure. Companies therefore have to govern how it is accessed, how it is handled, and where it is transferred. At the same time, the work‑from‑anywhere model across any device has spread, which increases the number of risky situations.
Attackers exploit how easily the human mind can be deceived: every message received or link clicked is, de facto, a transaction that needs to be verified. Zero trust therefore emphasizes identity, integrity, and context – much like checking goods and money in an exchange. According to the speaker, a large portion of incidents is caused by human error, so protecting people has a direct impact on protecting data.
Browser isolation and the modern web gateway
Remote Browser Isolation (RBI) moves web rendering into an isolated container in the cloud or on‑premises. The user sees the page as usual, but any attack hits only the container, not the workstation or applications. It’s a practical "compartmentalization" of risk for the most common vector – web browsing.
The new generation of Secure Web Gateway therefore doesn’t just deal with lists of "good" and "bad" sites, but also safely makes "gray", unknown domains accessible via RBI. This reduces the likelihood of a costly mistake after clicking a dubious link. Such an environment complements identity verification and protects users in everyday online transactions.
DLP and CDR: clean documents, fewer mistakes
Data Loss Prevention (DLP) ensures that sensitive information does not leak, whether intentionally or inadvertently, during routine work. The emphasis is on "coaching" users and minimizing the burden on administrators, with detection not relying solely on phrases or regular expressions. According to the speaker, solutions can identify meaning even in unstructured data and thereby more precisely target risky transfers.
Content Disarm and Reconstruction (CDR) applies zero trust to files: it assumes contamination, extracts only the visible content, and rebuilds the document from scratch (PDF, Office, CAD, and others). It also removes hidden added information, such as steganography, both on download and export. In combination with DLP and other components within a single SASE platform (SWG, CASB, ZTNA, and threat protection), this creates consistent data control across clouds, applications, and devices.