SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=Q6yFqLmlcGo



Category:
Show
Duration: 55:49
13,101 views
185


More about the SANS SEC530: Defensible Security Architecture course: www.sans.org/SEC530

Presented by: Eric Conrad, SANS Faculty Fellow

This webcast introduces the new SEC530: Defensible Security Architecture course. It is designed to help students understand and design a zero-trust architecture, where the old concepts of a trusted inside network and an untrusted outside are changed: nothing is trusted (by default), whether it's internal or external. "The perimeter is dead" is a favorite saying in this age of mobile, cloud, and the Internet of Things, and we are indeed living in new a world of "de-perimeterization".

This changing landscape requires a change in mindset, as well as a repurposing of many devices. Where does it leave our classic perimeter devices such as firewalls? What are the ramifications of the "encrypt everything" mindset for devices such as Network Intrusion Detection Systems? Join us on this webcast to learn what the course is about as well as some of the fundamentals of up-to-date defensible security architecture.




Other Videos By SANS Institute


2018-12-05Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
2018-12-04SANS STX Cyber Range
2018-11-29SANS Webcast - Zero Trust Architecture
2018-11-29Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting
2018-11-29SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
2018-10-24Practical Advice for Submitting to Speak at a Cybersecurity Conference
2018-10-23How I Pulled Off an Edgy Security Campaign – SANS Security Awareness Summit 2018
2018-10-23The Science of Security: The Psychological Impacts of Security Awareness Programs
2018-10-23The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018
2018-10-15SANS Webcast - YARA - Effectively using and generating rules
2018-10-15SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
2018-10-15SANS Webcast - Perimeter Security and Why it is Obsolete
2018-10-05Apples and Oranges?: A CompariSIEM – SANS Security Operations Summit 2018
2018-09-25Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework
2018-09-25Hacking your SOEL: SOC Automation and Orchestration – SANS Security Operations Summit 2018
2018-09-24SANS Institute - 2018 Security Awareness Report Webcast Sneak Peek
2018-08-28You’re Probably Not Red Teaming (And Usually I’m Not, Either) Webcast by Deviant Ollam
2018-08-17Introduction to Malware Analysis
2018-08-17SANS vLive Evening Classes - LEG523
2018-08-17SANS vLive Evening Classes - SEC504
2018-08-17Introduction to Linux



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training