Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a 12-minute conference talk exploring how Zero Trust represents a fundamental shift in cybersecurity strategy rather than just a product solution. Learn about the evolution from traditional VPN-based security to Zero Trust Network Access (ZTNA), sparked by the pandemic's remote work challenges. Discover the origins of Zero Trust, conceived by Forrester analyst John Kindervag in 2010, and its successful implementation by Google through the BeyondCorp initiative. Understand the core principles of "never trust, always verify," including explicit verification, least privilege access, and breach assumption. Explore how comprehensive security integration, spanning identity controls, device security, network protection, and data safeguarding, forms the foundation of an effective Zero Trust framework. Gain insights into why organizations must customize their Zero Trust approach based on their specific security needs and risk profiles, moving beyond the limitations of traditional "castle and moat" security models.
Syllabus
Zero Trust is a Strategy Not a Product with Jack Poller
Taught by
Tech Field Day