YoVDO

A Simplified and Practical Approach to Pursuing a Zero Trust Architecture

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Identity Management Courses

Course Description

Overview

Explore a simplified and practical approach to implementing a zero trust architecture in this 27-minute conference talk from RSA Conference. Learn design principles and overarching guidelines that don't require prohibitive resources and remain flexible and extensible. Discover how to focus on identity, policy, and people to create an effective zero trust framework. Gain insights from presenters Soumen Bhattacharya and Dr. Lynette Qu as they discuss topics including conditional access, reference materials, design principles, consolidation, enforcement, and real-world zero trust examples. Walk away with valuable takeaways to enhance your organization's security posture without major architectural revamps.

Syllabus

Introduction
Zero Trust Approach
Conditional Access
Reference Materials
Design Principles
Consolidation
Enforcement
Zero Trust Example
Takeaways


Taught by

RSA Conference

Related Courses

Office 365: Managing Identities and Services
Microsoft via edX
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms
Introduction to Microsoft Azure
Microsoft via edX
Manage Office 365 Identities
Microsoft via edX