Zero Trust: Case Studies and Lessons Learned

  • Friday, March 2, 2012 | 10:10 AM – 11:00 AM | Room: Room 310

View all Sessions

Old security models are like an M&M, a hard outside and soft center, trusting that attackers won't get past the perimeter. But today's advanced attacks easily pierce these shells. We must eliminate the soft center, and weave security throughout the network employing a "Zero Trust" model. In this session, we look at pioneering efforts to realize this model and design security from the inside out.


This document was retrieved from on Fri, 22 Feb 2019 05:10:02 -0500.