Explore the Zero Trust strategy fundamentals, trends and best practices with Microsoft security architect Mark Simos and Forrester analyst Steve Turner.
My notes:
- Zero Trust foundations: Definition and scope
- A unified security policy across the board
- Modernization of your security operations and SOC
- ZT is pushing all of those security fundamentals into the limelight
- Network-centric versus Identity-centric Zero Trust
- micro-segmentation
- Identity posture
- Identity governance
- Business enablement in hybrid work environment
- Work with business stakeholders
- Moving from VPN to Zero Trust Network Access (ZTNA)
- Modernizing you security approach
- Leverage Zero Trust strategy with cloud services for greater flexibility
- Risk areas and vulnerabilities
- ZT addresses compliance and regulatory workflows
- Expectation need to be woven into business, leadership, conversations, and thinking
- Fail-safe or fail-protected concept
- Emerging trends in Zero Trust
- IAM may evolve with new technologies and capabilities, and easily replaced to deliver different types of policy enforcement
Links:
- https://info.microsoft.com/ww-thankyou-Stay-Fearless-Zero-Trust-Webcast.html
- Evaluate your security posture with the Zero Trust assessment