1 / 9

The Zero-Trust Model

2 +. 2 +. The Zero-Trust Model. Redefining InfoSec. 2 +. 2 +. Who am i ?. 2 +. 2 +. The What, how, and why. What is the zero-trust model?. Identity is key. Never trust, always verify. Network Micro-segmentation Must know your data, the who, the where and the what

picardj
Télécharger la présentation

The Zero-Trust Model

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2 + 2 + The Zero-Trust Model Redefining InfoSec

  2. 2 + 2 + Who am i? This presentation is a product of the insane mind that is Chris Ruggieri

  3. 2 + 2 + The What, how, and why This presentation is a product of the insane mind that is Chris Ruggieri

  4. What is the zero-trust model? Identity is key. Never trust, always verify. Network Micro-segmentation Must know your data, the who, the where and the what Must enforce least-privilege Inspect and log all traffic VPN is dead, trust me. The Internet just became your network. This presentation is a product of the insane mind that is Chris Ruggieri

  5. Inspection capabilities • Micro-segment both external perimeter and internal traffic • Provides network optimization • Provides visibility into traffic as it crosses multiple network functions • Most of all, change the way we think about InfoSec - The traditional “castle and moat” ideology is dead How to create a zero-trust architecture 2 + This presentation is a product of the insane mind that is Chris Ruggieri

  6. Title Identity is Key Micro-segmentation • Draw on IAM strategy • Draw on MFA • Conditional policies • Big benefit of virtualization • Apply different policies to individual apps, even if they are on the same virtual server • Defines access by workload, application, VM, OS, or anything else you can think of. • Security through persistence. Network changes are less problematic This presentation is a product of the insane mind that is Chris Ruggieri

  7. Increased visibility • Reduces lateral movement after attack • Reduces alerting time once an attack has occurred • Better Scalability • Again, Persistence! • Improved capabilities Why zero-trust How does this affect my organization? This presentation is a product of the insane mind that is Chris Ruggieri

  8. Title 2 + Q&A Be Gentle This presentation is a product of the insane mind that is Chris Ruggieri

  9. 2 + 2 + THANK YOU Hope I didn’t bore you too much

More Related