YoVDO

Demystifying Zero Trust - DefCamp - 2021

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cybersecurity Courses Network Security Courses Data Governance Courses Least Privilege Courses

Course Description

Overview

Explore the concept of Zero Trust security in this 34-minute conference talk from DefCamp 2021. Delve into current cybersecurity trends, the shift in security mindset, and the reality of implementing Zero Trust. Learn about identity attacks, least privilege principles, and governance strategies for identities and data. Examine regular basic attacks, their potential impact, and the time frame for execution. Discover key assumptions, the role of automation, and gain an overview of Zero Trust implementation. Compare maturity models from Microsoft and CSA, and receive practical advice on next steps. Conclude with a summary and Q&A session to solidify your understanding of this critical cybersecurity approach.

Syllabus

Intro
Agenda
Trends in Cyber Security
Shift in Mindset
Security
Network Security
Identity Attacks
What is Zero Trust
The Reality of Zero Trust
Zero Trust Approach
Identities
Devices
Least Privilege
Identity Governance
Data Governance
Regular Basic Attacks
How Long Does It Take
What Could They Do
Assumptions
Automation
Zero Trust Overview
Zero Trust Impact
Microsoft Maturity Model
CSA Maturity Model
Summary
What to do
Questions


Taught by

DefCamp

Related Courses

PCI DSS: Restricting Access to Cardholder Data
Pluralsight
OWASP Top 10: #1 Injection and #2 Broken Authentication
LinkedIn Learning
Intermediate Endpoint Security
Cybrary
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
LinkedIn Learning
Privacy Engineering: Not Just for Privacy Engineers
USENIX Enigma Conference via YouTube