Zero Trust: it isn’t one piece of technology

When:  Nov 7, 2024 from 12:00 PM to 01:00 PM (ET)

Overview

As cyber threats evolve and advance, traditional cybersecurity methods can no longer protect critical infrastructure and government agencies from sophisticated attacks, including those by state actors and insider threats.

The Zero Trust security model treats all network traffic as untrusted until verified, requiring continuous authentication of users, devices and resources before granting access to sensitive data. Rooted in the principle of least privilege, Zero Trust only grants necessary access while monitoring activities in real-time to detect threats. 

In 2021, the US government mandated the adoption of Zero Trust architecture for US federal agencies and contractors. The National Institute of Standards and Technology provided guidelines, and the Department of Defense released a strategy based on years of Zero Trust development.

This session will run through the principles and history of Zero Trust, the common standards and guidance and some of the challenges of implementing it.

Learning outcomes

In this presentation, you will learn:

  • what Zero Trust is and why it’s important
  • the history of Zero Trust and the global direction into the future
  • challenges in implementing Zero Trust
  • commonly used standards and guidance for Zero Trust.
Register Now