Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move network defenses from static, network-based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan enterprise infrastructure and workflows.
In this presentation you’ll learn:
- Quick Level Set on Zero Trust
- Where to Start with Zero Trust Architecture
- Overlaying Zero Trust on top of current Defensive Cyber architecture
- How to build a Zero Trust Policy that matters
- Choosing the correct Sensors & Enforcement Points to enforce policy
- What are the largest challenges in creating a Zero Trust Strategy (Conditional Access, Mobile, O365, ICAM, etc…)
- The role of Technology Integration in Zero Trust Architecture