Zero Trust Architecture – Applying ZTA in Today’s Environment

preview_player
Показать описание
In the wake of the massive breach of computer systems of multiple government agencies discovered in December 2020, the US Federal Government is recommending that a Zero Trust security model be considered for all critical networks. As part of this major push to promote ZT adoption, DISA, NIST, and NSA are releasing specific guidelines. But is Zero Trust just a new marketing buzzword, a simple iteration over the well-known 'least privilege ' mindset, or a truly innovative strategy? Is Zero Trust truly attainable? If so, how do you get started and what are some of the tools and technologies that are available to implement it?
To answer these questions, join SANS instructors Ismael Valenzuela and Justin Henderson, co-authors of Security 530: Defensible Security Architecture and Engineering, as they provide their experience and provide specific advice on how to implement Zero Trust strategies.

#BlueTeamSummit #ZeroTrustArchitecture
Рекомендации по теме
Комментарии
Автор

I feel like making sure my Zero Trust is setup properly i use the OSSTMM (chapter 5 is on trust) AND it covered the idea of Zero Trust WAY before that dude at Forrester coined the term “zero trust”

biohackingalchemy
join shbcf.ru