Imagine it is 2028, five years into the organization's Zero Trust transformation. People like it, usability has improved. Defensibility is better, too, with a number of attacks having been stopped over the past couple years. But then, in 2028, a call comes in. There’s been a security breach. What happened!? Join this session for a pre-mortem on how breaches will look under a Zero Trust architecture.