Overview
Explore a simplified and practical approach to implementing a zero trust architecture in this 27-minute conference talk from RSA Conference. Learn design principles and overarching guidelines that don't require prohibitive resources and remain flexible and extensible. Discover how to focus on identity, policy, and people to create an effective zero trust framework. Gain insights from presenters Soumen Bhattacharya and Dr. Lynette Qu as they discuss topics including conditional access, reference materials, design principles, consolidation, enforcement, and real-world zero trust examples. Walk away with valuable takeaways to enhance your organization's security posture without major architectural revamps.
Syllabus
Introduction
Zero Trust Approach
Conditional Access
Reference Materials
Design Principles
Consolidation
Enforcement
Zero Trust Example
Takeaways
Taught by
RSA Conference