PodParley PodParley
#172 Zero Trust Architecture

EPISODE · Nov 9, 2023 · 34 MIN

#172 Zero Trust Architecture

from Embracing Digital Transformation

In this podcast episode Darren talks with Steve Orrin and Dave Marcus and discusses zero trust architecture, a new security model needed for today's digital environments where the network perimeter is disappearing. Experts explain what zero trust is, key principles like default deny access and continuous authentication, and advice for organizations starting their zero trust journey.Digital transformation initiatives aim to leverage new technologies to improve business processes and deliver better experiences for customers and employees. However, as organizations extend their networks and adopt cloud services, the traditional security model of trusted networks is no longer sufficient. This creates vulnerabilities that cybercriminals can exploit.Zero trust architecture provides a framework to enhance security in today's complex environments. But what exactly is zero trust, and how can organizations start their journey towards implementing it? Factors Driving Zero Trust ArchitectureAt its core, zero trust architecture is about applying continuous, granular policies to assets and resources when users or entities attempt to access or interact with them. This policy gets applied regardless of the location - on premise, cloud, hybrid environments, etc. The key principles are:* Default deny - Access is denied by default. Users must authenticate and be authorized for the specific context.* Continuous authentication - Users are re-authenticated and re-authorized throughout their sessions based on analytics of identity, time, device health, etc.* Microsegmentation - Fine-grained controls are applied for lateral movement between assets and resources.This differs from traditional network security that uses implied trust based on whether something is inside the network perimeter. Getting Started with Zero TrustImplementing zero trust is a continuous journey, not a one-time project. However, organizations need to start somewhere. Here are a few best practices:* Educate yourself on zero trust frameworks and concepts* Map out a workflow for a medium-risk application and identify dependencies* Leverage existing infrastructure - microsegmentation, encryption, visibility tools* Obtain executive buy-in and involve business stakeholders* Start with a solid cybersecurity foundation - hardware roots of trust, encryption, asset inventory* Increase visibility into the operational environment and supply chainWhile zero trust may require new investments in technology and process changes over time, organizations can make significant progress by refining how they use what they already have. Looking AheadAs business applications and resources continue migrating outside the traditional network perimeter, zero trust allows a more dynamic and contextual approach to security. Instead of blanket allowances based on location, granular controls are applied according to the specific access requirements.This journey requires vigilance - policies must adapt as business needs evolve, and new risks emerge. But with the right vision and commitment, zero trust architecture provides a path forward to enable digital innovation and resilience.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

NOW PLAYING

#172 Zero Trust Architecture

0:00 34:54

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Managing Next Generation Energy Systems Cambridge University Background Stakeholders working with energy systems have to make complex decisions formulated from risk-based assessments about the future. The move towards more renewables in our energy systems complicates matters even further, requiring the development of an integrated power grid and continuous and steady transformation of the UK power system. Network flows must be managed reliably under uncertain demands, uncertain supply, emerging network technologies and possible failures and, further, prices in related markets can be highly volatile. Mathematicians working with engineers and economists, can make significant contributions to address such issues, by helping to develop fit-for-purpose models for next generation energy systems. These interdisciplinary approaches are looking to address a range of associated problems, including modelling, prediction, simulation, control, market and mechanism design and optimisation. This knowledge exchange workshop was part of the four months Res The Digital Resilience Show David Wild Podcast by David Wild Solving for Change MOBIA Technology Innovations Solving for Change welcomes business and technology leaders to share stories of bold business transformation within complex organizations. In an era when technology and markets are changing around businesses, the key to staying competitive is to evolve in response to those changes.  MOBIA’s Mike Reeves and Marc LeBlanc investigate business transformation, deconstructing the challenges, ambitions, and market disruptions that drive companies to embark on transformation journeys, and exploring their unique approaches to achieving meaningful outcomes.  What sparks leaders to pursue business transformation? How do they overcome the challenges along the way? What are the keys to creating enduring change?  Through in-depth conversations with business and technology leaders, Mike and Marc answer these questions and explore how businesses evolve by pulling four key transformation levers: people, process, technology, and culture. Darknet Discussions Darknet Discussions Welcome to "Darknet Discussions," the podcast that gets into the shadows of the internet to bring you the most intriguing, enlightening, and sometimes unsettling stories from the dark web. Hosted by seasoned darknet aficionados, each episode of "Darknet Discussions" explores the intricate dynamics of darknet markets, cybersecurity threats, and the digital underworld. Join us as we interview experts, discuss the latest trends in cybercrime, and shed light on the technologies that operate beneath the surface of everyday internet use. Also, we occasionally go off on a tangent about something completely unrelated.
URL copied to clipboard!