Главная
Study mode:
on
1
Intro
2
Agenda
3
Trends in Cyber Security
4
Shift in Mindset
5
Security
6
Network Security
7
Identity Attacks
8
What is Zero Trust
9
The Reality of Zero Trust
10
Zero Trust Approach
11
Identities
12
Devices
13
Least Privilege
14
Identity Governance
15
Data Governance
16
Regular Basic Attacks
17
How Long Does It Take
18
What Could They Do
19
Assumptions
20
Automation
21
Zero Trust Overview
22
Zero Trust Impact
23
Microsoft Maturity Model
24
CSA Maturity Model
25
Summary
26
What to do
27
Questions
Description:
Explore the concept of Zero Trust security in this 34-minute conference talk from DefCamp 2021. Delve into current cybersecurity trends, the shift in security mindset, and the reality of implementing Zero Trust. Learn about identity attacks, least privilege principles, and governance strategies for identities and data. Examine regular basic attacks, their potential impact, and the time frame for execution. Discover key assumptions, the role of automation, and gain an overview of Zero Trust implementation. Compare maturity models from Microsoft and CSA, and receive practical advice on next steps. Conclude with a summary and Q&A session to solidify your understanding of this critical cybersecurity approach.

Demystifying Zero Trust - DefCamp - 2021

DefCamp
Add to list