Zero Trust Architecture: Beyond Proxy or Point Solutions

Subscribers:
23,600
Published on ● Video Link: https://www.youtube.com/watch?v=5z6GtiHc4-A



Duration: 32:07
270 views
5


SANS Blue Team Summit 2023
Zero Trust Architecture: Beyond Proxy or Point Solutions
Speaker: Sitaraman lakshminarayanan, Director - Security Architecture, Gardent Health

We all know Zero Trust Architecture is not a point solution but yet many vendors sell them as one Product or Solution. Most Zero Trust Products are deployed as Proxy Solution but Zero Trust is more than just securing at the edge or Proxy. In this presentation, we will cover What is Zero Trust Architecture, various components of ZTA /Micro-Segmentation, and how they all relate together.

1.Proxy / Edge (SASE)
2. Network Segmentation ( Broader Segmentation at Wireless/ Corporate to Micro Segmentation at Application)
3. Identity & Device Trust
4. System Security (Identity, Device, Application and Responding to Incidents to limit the damage)
5. Modern Identity & Access Control techniques
6.Moving from Enterprise to Application/Cloud (Beyond Prod approach)

Author will also share various challenges in deploying each of these components.

View upcoming Summits: http://www.sans.org/u/DuS




Other Videos By SANS Cyber Defense


2023-11-05Tips & Tricks For Digital Dumpster Diving
2023-11-05Unlocking the Digital Landscape: Exploring the Power of OSINT for a Connected World
2023-11-05The Growth of Global Election Disinformation: The Role & Methodology of Govt-linked Cyber Actors
2023-09-12Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023
2023-08-09Hunting for Suspicious HTTPS and TLS Connections
2023-08-03What does it take to author a cybersecurity book?
2023-07-31Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22!
2023-07-28The Risk to Space: Satellite Communications Systems and Ground Networks as Attack Targets
2023-07-28Drop It Like It's Qbot Separating malicious droppers, loaders, and crypters from their payloads
2023-07-28Panel | 1%: Tiny Gains producing Big Improvements
2023-07-28Zero Trust Architecture: Beyond Proxy or Point Solutions
2023-07-28Ecosystem of Insights: Building Operation Dashboards That Enable Teams
2023-07-28Bridging the Gap: Improving Rules Effectiveness by Integrating Detection and Response
2023-07-28Blueprint Live - 11 Strategies of a World-Class Cybersecurity Operations Center
2023-07-28Cloudy with a Chance of Breaches: OSINTAdventures in Tracing Exposed Credentials
2023-07-28Hunting OneNote Malware: A Practical Guide for Blue Teams
2023-07-28BlueHound: Blue Teams of the World Unite!
2023-07-28The Cyber Pilfer Chain: detecting and disrupting post-exploitation data theft
2023-07-28Keynote | How to Save Your SOC from Stagnation
2023-07-28Keynote | Leave Only Footprints: When Prevention Fails
2023-07-28Blurple Teaming: Open Source Continuous Security Testing in the SOC



Tags:
cyber defense
cyber security
cyber defense training
cyber security training
cybersecurity
cybersecurity training
blue team summit
sans blue team summit
blue team cyber security
blue teaming
blue teaming cyber security
SASE
zero trust architecture
zero trust
ZTA
microsegmentation
micro-segmentation
Sitaraman Iakshminarayanan
zero trust cyber security
zero trust solutions