What is Zero Trust?

Logo
Presented by

Eric Cole

About this talk

This episode of Life of a CISO is focused on Zero Trust architecture. What Zero Trust means is that by default, all devices in a network have to be authenticated in order to interconnect with other devices. An example of what not to do is Target, which was so unprotected that hacking an HVAC third-party vendor led to being able to access sensitive customer financial data. The best case scenario is a thin client on a virtual machine, meaning that every time the computer is logged off the network, the authentications are revoked, so one compromised server cannot compromise others. All the security patches in the world can’t do anything if you can compromise a person, either by force or by deception, into allowing access to sensitive data. So as a CISO, you must take all of these elements into account when designing your security.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (35)
Subscribers (734)
Secure Anchor Consulting - Channel