Zero-Trust Architecture: Bridging the Gap Between Mandate and Implementation

Logo
Presented by

Fatema Bannat Wala, Security Engineer | ESnet/LBNL

About this talk

As cyber threats continue to evolve and breach traditional network boundaries, organizations face mounting pressure to adopt zero-trust architecture (ZTA) – not just as a security framework, but as a federal mandate. This paradigm shift recognizes that threat actors can emerge from anywhere – whether inside your trusted network or beyond its boundaries – demanding a complete rethinking of security monitoring strategies. While the zero-trust mandate establishes clear objectives for security models and system design principles, many organizations struggle with practical implementation, particularly in network security monitoring (NSM). Traditional NSM tools, designed for perimeter-based security models need to evolve to meet ZTA requirements. This session critically examines popular open-source NSM solutions, evaluating their readiness for ZTA implementation and exploring the necessary evolution of monitoring principles to support a true zero-trust environment. Join ESnet/LBNL Security Engineer, Fatema Bannat Wala for an in-depth analysis of the challenges and opportunities in adapting existing NSM tools for ZTA. Key Takeaways: - Understand the core principles of ZTA and how they fundamentally differ from traditional security monitoring approaches. - Evaluate the capabilities and limitations of current open-source NSM tools in supporting zero-trust implementation. - Learn critical monitoring principles that need to evolve to align with ZTA requirements and federal mandates. - Gain practical insights into assessing your organization's readiness for ZTA and identifying necessary technological adaptations.
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (657)
Subscribers (217042)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.