Zero Trust Architecture – Applying ZTA in Today’s Environment

Zero Trust Architecture – Applying ZTA in Today’s Environment

Subscribers:
20,000
Published on ● Video Link: https://www.youtube.com/watch?v=vskbjR1hyd8



Duration: 52:23
4,074 views
81


In the wake of the massive breach of computer systems of multiple government agencies discovered in December 2020, the US Federal Government is recommending that a Zero Trust security model be considered for all critical networks. As part of this major push to promote ZT adoption, DISA, NIST, and NSA are releasing specific guidelines. But is Zero Trust just a new marketing buzzword, a simple iteration over the well-known 'least privilege ' mindset, or a truly innovative strategy? Is Zero Trust truly attainable? If so, how do you get started and what are some of the tools and technologies that are available to implement it?
To answer these questions, join SANS instructors Ismael Valenzuela and Justin Henderson, co-authors of Security 530: Defensible Security Architecture and Engineering, as they provide their experience and provide specific advice on how to implement Zero Trust strategies.

Justin Henderson, Certified Instructor - twitter.com/securitymapper
Ismael Valenzuela, Certified Instructor - twitter.com/aboutsecurity

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE
#BlueTeamSummit #ZeroTrustArchitecture







Tags:
sans institute
blue team
blue team operations
zero trust
zero trust architecture
zero trust security model
justin henderson
ismael valenzuela
justin henderson sans
ismael valenzuela sans
blue team summit
zero trust explained
zero trust for dummies
zero trust network