SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
More about the SANS SEC530: Defensible Security Architecture course: www.sans.org/SEC530
Presented by: Eric Conrad, SANS Faculty Fellow
This webcast introduces the new SEC530: Defensible Security Architecture course. It is designed to help students understand and design a zero-trust architecture, where the old concepts of a trusted inside network and an untrusted outside are changed: nothing is trusted (by default), whether it's internal or external. "The perimeter is dead" is a favorite saying in this age of mobile, cloud, and the Internet of Things, and we are indeed living in new a world of "de-perimeterization".
This changing landscape requires a change in mindset, as well as a repurposing of many devices. Where does it leave our classic perimeter devices such as firewalls? What are the ramifications of the "encrypt everything" mindset for devices such as Network Intrusion Detection Systems? Join us on this webcast to learn what the course is about as well as some of the fundamentals of up-to-date defensible security architecture.
Видео SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture канала SANS Institute
Presented by: Eric Conrad, SANS Faculty Fellow
This webcast introduces the new SEC530: Defensible Security Architecture course. It is designed to help students understand and design a zero-trust architecture, where the old concepts of a trusted inside network and an untrusted outside are changed: nothing is trusted (by default), whether it's internal or external. "The perimeter is dead" is a favorite saying in this age of mobile, cloud, and the Internet of Things, and we are indeed living in new a world of "de-perimeterization".
This changing landscape requires a change in mindset, as well as a repurposing of many devices. Where does it leave our classic perimeter devices such as firewalls? What are the ramifications of the "encrypt everything" mindset for devices such as Network Intrusion Detection Systems? Join us on this webcast to learn what the course is about as well as some of the fundamentals of up-to-date defensible security architecture.
Видео SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture канала SANS Institute
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![SANS Webcast - Zero Trust Architecture](https://i.ytimg.com/vi/5sFOdpMLXQg/default.jpg)
![SANS Webcast - Perimeter Security and Why it is Obsolete](https://i.ytimg.com/vi/YqhxrXW_gic/default.jpg)
![The 14 Absolute Truths of Security | SANS@MIC Talk](https://i.ytimg.com/vi/BoHzUugZ9Bk/default.jpg)
![A Cloud Security Architecture Workshop](https://i.ytimg.com/vi/4TxvqZFMaoA/default.jpg)
![Threat Hunting via Sysmon - SANS Blue Team Summit](https://i.ytimg.com/vi/7dEfKn70HCI/default.jpg)
![How to Present Cyber Security Risk to Senior Leadership | SANS Webcast](https://i.ytimg.com/vi/_uCmvfOhR_E/default.jpg)
![No More Firewalls! How Zero-Trust Networks Are Reshaping Cybersecurity](https://i.ytimg.com/vi/pyyd_OXHucI/default.jpg)
![How to Become a Security Architect](https://i.ytimg.com/vi/OOAuWu3p4mM/default.jpg)
![The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac](https://i.ytimg.com/vi/_nVq7f26-Uo/default.jpg)
![Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019](https://i.ytimg.com/vi/EF_0dr8WkX8/default.jpg)
![Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017](https://i.ytimg.com/vi/czvMyP5aDfI/default.jpg)
![AWS re:Invent 2020: Security best practices the AWS Well-Architected way](https://i.ytimg.com/vi/wfIVI-M7lbQ/default.jpg)
![Zero Trust Throughout Your Infrastructure with Nir Zuk, Founder and CTO of Palo Alto Networks](https://i.ytimg.com/vi/zzZ4q9DSnbg/default.jpg)
![Internet of Things Security | Ken Munro | TEDxDornbirn](https://i.ytimg.com/vi/pGtnC1jKpMg/default.jpg)
![Designing the Right Security Architecture for your APIs (Cloud Next '19)](https://i.ytimg.com/vi/PRGm2l-YhV0/default.jpg)
![The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018](https://i.ytimg.com/vi/WTN7n7744B4/default.jpg)
![ACM Webcast: Network Threat Hunting Runbook](https://i.ytimg.com/vi/_h4cmNydZXg/default.jpg)
![How to approach a Zero Trust security model](https://i.ytimg.com/vi/6q6c0Ld0qx0/default.jpg)
![Secure by Design - Security Principles for the Working Architect - Eoin Woods [ACCU 2019]](https://i.ytimg.com/vi/YbjoaMN67Hw/default.jpg)
![The Fallacy of the "Zero-Trust Network"](https://i.ytimg.com/vi/tFrbt9s4Fns/default.jpg)