While not entirely a new concept, zero trust architecture has been gaining grounds as not just a strategic solution to today’s increasingly complex issues in the IT landscape, but also as a major change to the way we do information and security architectures. With such enormous potential however, several interesting technical challenges have come to the fore.
Join our Global Field CTO Ian Farquhar as we cover some topics and potential solutions to issues such as:
● Assessing trustworthiness through network behaviours;
● Introducing the “log attack chain” and improving the reliability of logging and telemetry with deep observability;
● Detecting advanced threats such as implants and “below the firmware” attacks;
● Zero trust principles and the contrary “trusting down” approach; and
● Zero trust and SSL/TLS decryption — how will this be done?