As organizations transform into becoming Cloud-First they have the opportunity to re-engineer their cybersecurity defenses. Firewall technology and web application defenses have proved to be defenseless against attackers and the onset on ransomware. Cloud-native applications and their supporting architectures (e.g., microservices, containers, and orchestration) are requiring more security. Both machine and human user identities must be protected at an even higher level of assurance.
Making Zero Trust a practical reality for organizations today requires not only strategic governance and oversight, but security engineering knowledge and implementation skill. In this presentation we examine the principles of Zero Trust and how they can be applied to defend not only identities, but also data, infrastructure, network components, web-service endpoints, and applications. Building on core principles we show how-to effectively implement Zero Trust in the Cloud for comprehensive security coverage, how-to strengthen the coverage using machine learning, and how identity and access management can be simplified. We provide a workbook where participants can evaluate their own organizations readiness for Zero Trust and conduct a mock vendor selection for Zero-Trust solutions and services.
Demonstrate a practical understanding of Zero Trust principals and design patterns.
Have the ability to create an organizational Zero Trust strategy.
How-to conduct a Zero Trust readiness assessment.
Have the ability to understand Zero Trust vendor solutions and make selections.