Posted on
in Presentations
The old perimeter is being supplemented, as the firewall shouldn’t be the only policy enforcement point. Discuss the “zero trust” and Google “BeyondCorp” models with your peers: how to adopt this new way of looking at users, endpoints and applications; what resources are needed; and which risks it mitigates.
Learning Objectives:
1: Understand what "zero trust" actually means (it’s not a product).
2: Learn how it can apply to different types of organizations.
3: Discuss the stages, effort, resourcing and resulting risk reduction.
Security Strategy & Architecture
SSO software defined networking security architecture practitioner perspectives access control
Topic
Security Strategy & Architecture
Subtopic
SSO
software defined networking
security architecture
practitioner perspectives
access control
Share With Your Community