The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
As organizations transform into becoming Cloud-First they have the opportunity to re-engineer their cybersecurity defenses. Firewall technology and web application defenses have proved to be defenseless against attackers and the onset on ransomware. Cloud-native applications and their supporting architectures (e.g., microservices, containers, and orchestration) are requiring more security. Both machine and human user identities must be protected at an even higher level of assurance.
Making Zero Trust a practical reality for organizations today requires not only strategic governance and oversight, but security engineering knowledge and implementation skill. In this presentation we examine the principles of Zero Trust and how they can be applied to defend not only identities, but also data, infrastructure, network components, web-service endpoints, and applications. Building on core principles we show how-to effectively implement Zero Trust in the Cloud for comprehensive security coverage, how-to strengthen the coverage using machine learning, and how identity and access management can be simplified. We provide a workbook where participants can evaluate their own organizations readiness for Zero Trust and conduct a mock vendor selection for Zero-Trust solutions and services.
Learning Objectives:
Demonstrate a practical understanding of Zero Trust principals and design patterns.
Have the ability to create an organizational Zero Trust strategy.
How-to conduct a Zero Trust readiness assessment.
Have the ability to understand Zero Trust vendor solutions and make selections.
Speaker(s):
Mr. Richard
Tychansky,
CISSP-ISSEP, CCSP, CGRC, CSSLP,
Security Architect,
Independent
You must be logged in and own this session in order to
post comments.