What's NOT Included in Zero Trust Architecture

Logo
Presented by

Steven Ross, Executive Principal | Risk Masters International

About this talk

Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus these environmental elements are the basis for secure use of information resources, today and as a foundation for future growth. This session presents each of these elements as products to be evaluated, acquired and implemented in order to achieve full zero trust. Learning objectives: - The various security methods that support ZTA but are not included in it. - The value proposition for a fully supported zero trust environment. - The vendor landscape of these supportive methods. - Determining the need for supplemental products and tools.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198987)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.