Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Zero Trust is one of the most misused “buzzwords” in the industry today. Vendor marketing and other misleading data has unfortunately caused mass confusion about what Zero Trust really is and how to use it properly.
Former Forrester Research analyst and creator of Zero Trust, John Kindervag, stops in to demystify the term, while explaining how it’s a proven security strategy within enterprise security. Our conversation at the bar includes properly defining the term, the value of adoption, implementation techniques, exemptions, and more!
SYMLINKS
LinkedIn
Twitter
ON2IT
Zero Trust (Wikipedia)
No More Chewy Centers: Introducing The Zero Trust Model Of Information Security (2010)
Build Security Into Your Network’s DNA: The Zero Trust Network Architecture (2010)
Biden Executive Order on Improving the Nation’s Cybersecurity
The US vs PCF Manning case
The Conrad Hilton Hotel Bar (Dublin)
The Claridge Hotel Bar (London)
Driscol Hotel Bar (Austin TX)
DRINK INSTRUCTION
PYTHON
1 1/2 oz White Rum
1 oz Mint Liqueur
1 oz Pineapple Juice
Lemon Lime Soda
Half Lemon
Add all ingredients into a cocktail shaker. Shake and strain over glass with ice. Squeeze half of lemon in. Top with Lemon Lime soda.
CONNECT WITH US
http://www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at info@barcodesecurity.com