Zero Trust - Away from the Perimeter to More Control and Security

Protecting information security at the perimeter of an organization is no longer practical. The Zero Trust concept shows new ways.

Topic

Awareness / Phishing / FraudData security / DLP / Know-how protectionNetwork Security / Patch Management

When & Where

calendar_month

Thu, 10/27/2022, 10:30 - 10:45

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

 

The Zero Trust concept - Maintaining information security only at the perimeter of an organization is no longer practical with the current advancing threat environment. Zero Trust is based on the concept that no implicit trust is placed in assets or user accounts, and access is granted only on a need-to-know basis. It therefore shifts defenses to users, assets and resources.
A ZTA conceptual approach reduces the attack surface and radius, is much more effective than traditional VPN technologies, and implements a least privilege approach.
These are achieved by means of microsegmentation/traffic isolation of the network infrastructure, among other things.

Learn more about this approach and its implementation in the presentation by Kurt Semba, ...

Speaker

Moderator