Dynadot

security Zero Trust Architecture – Applying ZTA in Today's Environment

Spaceship Spaceship
Watch

Future Sensors

78% of human domainers will be replaced by robotsTop Member
Impact
23,259
Zero Trust Architecture – Applying ZTA in Today's Environment

In the wake of the massive breach of computer systems of multiple government agencies discovered in December 2020, the US Federal Government is recommending that a Zero Trust security model be considered for all critical networks. As part of this major push to promote ZT adoption, DISA, NIST, and NSA are releasing specific guidelines. But is Zero Trust just a new marketing buzzword, a simple iteration over the well-known 'least privilege ' mindset, or a truly innovative strategy? Is Zero Trust truly attainable? If so, how do you get started and what are some of the tools and technologies that are available to implement it? To answer these questions, join SANS instructors Ismael Valenzuela and Justin Henderson, co-authors of Security 530: Defensible Security Architecture and Engineering, as they provide their experience and provide specific advice on how to implement Zero Trust strategies.

Watch the Youtube video below, by SANS Cyber Defense (52 min)

 
1
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back