Playlist

Zeroing in on Zero Trust

9 videos in this playlist
Event Recording
Practical Zero Trust: From Concepts to Quick Wins to a Strategy
Mar 23, 2022

So, you’ve heard a lot of impressive things about Zero Trust, and how implementing it in your organization should solve most of your security problems, especially these days, when people still primarily have to work remotely. Now you would like to start with Zero Trust as soon as possible, but still unsure how to separate truth from fiction and how to turn theory into practical steps? Then you are at the right event!

But before jumping to specific technologies in later presentations, we have to address some common misconceptions and dispel a couple of myths. Most importantly, we will demonstrate that Zero Trust is not a single product you can buy, but a broad spectrum of practical solutions that address various business problems by targeted application of ZT principles.

Are you looking to implement Zero Trust for your corporate network? For your modern cloud-native application? To secure your sensitive data against unauthorized access? Only you can assess your risks and set your priorities. But we can help you understand the true scope of ZT-enabled solutions and to show how to look beyond labels, focusing on specific capabilities needed to solve your burning business problems.

Event Recording
Siemens – heading towards our Zero Trust Vision and how we measure the implementation status
Mar 23, 2022

Getting a global IT company Zero Trust ready is a huge challenge. And now imagine you have to do that plus hundreds of factories, trains, and other machines as well as tools.

Siemens is already in the middle of that enormous process. To give you an insight how to cope with such a challenge, Thomas Mueller-Lynch and Peter Stoll will share today

  • how important their target vision is.
  • how they want to reach that vision – and why they know they never will.
  • how they measure their progress on defined KPIs.
Event Recording
And Now What? How to Approach Zero Trust for Success
Mar 23, 2022

Fabrizio has been working on Zero Trust Architectures since 2017. In this talk, he will show how to approach a Zero Trust initiative (or program) in the most successful way. The presentation will touch on both strategical and tactical approaches and what needs to be considered for each.

Event Recording
Identity as the Key to Zero Trust Maturity
Mar 23, 2022

Okta’s vision is to enable everyone to safely use any technology. Trust is critical to our business and our customers' success. Markus Grüneberg will speak about the modern digital identity and how to use them to build a robust security strategy. In this keynote he will present among maturity stages Okta's role model for Zero Trust. 

Event Recording
Panel | Best Practices to Get Started on Your Zero Trust Journey
Mar 23, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.

 

Event Recording
Interview with Eleni Richter
Mar 23, 2022
Event Recording
Pitfalls in the Road to Zero Trust
Mar 23, 2022
Zero trust promises better security in a highly interconnected world, but many of the tenets of zero trust are contradictory to entrenched practices and ideas. Getting beyond MFA into a true zero trust environment isn't an incremental change, it's a radical restructuring of how resources are secured and accessed.
  • Encrypt everything - True end to end encryption means that data packets can't be inspected for malware in between the source and destination. Are your endpoints ready? Can your policies adapt?
  • Micro-segmentation - Preventing lateral movement of an attacker requires breaking up the smooth flow of data across a network. But segmentation is inherently inefficient. Is your network able to meet the need for speed?
  • Deny all by default - Users are all in favor of security, until it impacts their ability to work. If access is denied by default, do you have processes in place to quickly approve access when needed? Are the users (including those in the c-suite) on board?
  • Continuous authorization - Using trust scores works well in white papers, but do you know what the rules governing access to your resources really are? Does your IT department have the authority to drop a user mid-transaction because of a change in their trust score? Have you decided what your risk tolerance is?
Event Recording
Standards and Zero Trust
Mar 23, 2022
While many in our industry see Zero Trust as the new security architecture paradigm that will increase security program effectiveness, reduce entropy of security architectures, and finally bring the advances in information security that were promised by de-perimeterization over a decade ago, the lack of standards around what ZTA actually is present a potential barrier to adoption.
This talk will :
  • discuss why standards are critical in the Zero Trust area
  • provide an overview of the standards landscape around zero trust
  • describe the benefits to user organizations as well as to suppliers of advancing standard in the area of Zero Trust
Event Recording
Enterprise Readiness for Zero Trust
Mar 23, 2022
Preparing to embark on the Zero Trust journey for your Enterprise users can be daunting. Discussed will be a consolidated review of objectives, resources, policies, and other considerations required to honestly assess your current organization and plan your strategy for gracefully embracing zero trust for your workforce.