InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to Meet Zero Trust Standards [D2iQ + GDIT]

Presented by

Moderator: Diego Laje, SIGNAL Media Speakers: Dan Ciruli, D2iQ, David Sperbeck, GDIT, and Dr. John Sahlin, GDIT

About this talk

In this session, Kubernetes experts from GDIT and D2iQ discuss how to secure your digital assets and create a Zero Trust culture within your organization. Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero-trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption, and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks. Developers and security experts are now tasked with extending Kubernetes’ built-in security to effectively protect against more complex, volatile, and frequent cyber attacks. The previous “trust but verify” approach has often proven ineffective for the complex distributed nature of cloud computing, so Kubernetes security is being elevated to the “never trust, always verify” ideology of the zero-trust model to provide greater protection to organizations. Key Takeaways: —Basic Concepts of the Zero-Trust Model —Three Best Practices for Zero Trust 1) Optimize Software Configuration, Access Permissions 2) Log and Monitor Data 3) Focus on People and Process Management —How to Create a Zero Trust Security Culture
D2iQ

D2iQ

2711 subscribers16 talks
Smart Apps and Opps on Day 2
D2iQ accelerates Day 2 success for smart cloud-native applications on enterprise Kubernetes with cloud native expertise, simplicity, and military-grade security.
Related topics