Zero Trust: Case Studies and Lessons Learned
Old security models are like an M&M, a hard outside and soft center, trusting that attackers won't get past the perimeter. But today's advanced attacks easily pierce these shells. We must eliminate the soft center, and weave security throughout the network employing a "Zero Trust" model. In this session, we look at pioneering efforts to realize this model and design security from the inside out.