No More Firewalls! How Zero-Trust Networks Are Reshaping Cybersecurity
Matt Soseman, Security Architect, Microsoft
Network firewalls are becoming irrelevant, and we can no longer assume that perimeter networks can be trusted. With adoption of bring your own device and bring your own cloud, we must evolve our defenses to devices and identities. Join this session to explore this new world via rich live demos. (No PowerPoint allowed!)Learning Objectives:1: Understand how the security state and trustworthiness contribute to overall security posture.2: Learn considerations for automated access to resources via device and identity conditions.3: Discover how to apply these conditions to line of business SaaS apps or on-premises web apps.Pre-Requisites:Attendees should be familiar with the modern challenges of protecting identity and information in the age of cloud and mobility. Attendees should understand fundamental concepts such as Software-as-a-Service and bring your own device (BYOD).
Видео No More Firewalls! How Zero-Trust Networks Are Reshaping Cybersecurity канала RSA Conference
Network firewalls are becoming irrelevant, and we can no longer assume that perimeter networks can be trusted. With adoption of bring your own device and bring your own cloud, we must evolve our defenses to devices and identities. Join this session to explore this new world via rich live demos. (No PowerPoint allowed!)Learning Objectives:1: Understand how the security state and trustworthiness contribute to overall security posture.2: Learn considerations for automated access to resources via device and identity conditions.3: Discover how to apply these conditions to line of business SaaS apps or on-premises web apps.Pre-Requisites:Attendees should be familiar with the modern challenges of protecting identity and information in the age of cloud and mobility. Attendees should understand fundamental concepts such as Software-as-a-Service and bring your own device (BYOD).
Видео No More Firewalls! How Zero-Trust Networks Are Reshaping Cybersecurity канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Firewall Types & Generations Explained - Part 1 of 2Using Tetration to Implement Zero Trust Networking (Microsegmentation)Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019Breaking Password Dependencies: Challenges in the Final Mile at MicrosoftCompTIA Network+ Certification Video CourseGoogle on BeyondCorp: Empowering Employees with Security for the Cloud EraFuture Forests: Realistic Strategies for AD Security & “Red Forest” ArchitecturePalo Alto Networks on Zero Trust with ForescoutThink and Act Like a Hacker to Protect Your Company’s AssetsThe Five Most Dangerous New Attack Techniques and How to Counter ThemSANS Webcast - Trust No One: Introducing SEC530: Defensible Security ArchitectureImplementing Best Practices for Zero TrustAWS re:Invent 2017: Using the Software Defined Perimeter to Secure and Connect to AW (DEM16)Ochko123 - How the Feds Caught Russian Mega-Carder Roman SeleznevHighlights from Ignite 2020: Implementing a Zero Trust security model at MicrosoftStop Malware in Your Datacenter with Zero Trust: What You Need to KnowThe Fallacy of the "Zero-Trust Network"Building Identity for an Open PerimeterWhat, Why, and How of Zero Trust Networking