Mastering Zero Trust with CISA's Zero Trust Maturity Model: Expert Analysis and Implications

  Рет қаралды 2,407

Cloud Security Alliance

Cloud Security Alliance

Күн бұрын

Пікірлер: 1
@stantkatchenko1341
@stantkatchenko1341 11 ай бұрын
It is a pity that this conversation lacks comments.. Please let me fix that. I will start with the Pillars work prioritisation. Q: What must be done first? A (Practitioner perspective) - Whatever can be done to address critical risks. For example, if AAA allowing access to some TS data is weak, fix it first. No business owner would allow leaving it on a backburner because of a great a ‘bow-tie’ roadmap. Next step? Assess the small step, learn your lessons and extend. Trainer perspective - it helps to visualise. Let’s imagine an art collector house with a broken window (single factor authentication). Would you replace it with similar or with a double glazed, tempered glass and steel a deadlock (hardware token with a built-in HSM users can only get after retinal scan)? The second option is better but comes a price tag. Practitioner perspective: Price tag is mostly labour. So gained experience would allow repeating the solution for S and even PROTECTED. A bit of a conclusion: Roadmap is very much enterprise specific and must account for most valuable assets, risks and real delivery experience.
ON2IT Zero Trust Implementation for Financial Institutions
49:37
Cloud Security Alliance
Рет қаралды 738
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
49:39
She's very CREATIVE💡💦 #camping #survival #bushcraft #outdoors #lifehack
00:26
НАШЛА ДЕНЬГИ🙀@VERONIKAborsch
00:38
МишАня
Рет қаралды 2,9 МЛН
Сюрприз для Златы на день рождения
00:10
Victoria Portfolio
Рет қаралды 2,4 МЛН
The Fallacy of the "Zero-Trust Network"
44:18
RSA Conference
Рет қаралды 55 М.
Flutter Engage
3:58:21
Flutter
Рет қаралды 1,9 МЛН
Early Feasibility Studies in the Electrophysiology Space
1:12:19
MDIC - Medical Device Innovation Consortium
Рет қаралды 67
Inside the DoD Zero Trust Strategy
46:24
Billington CyberSecurity
Рет қаралды 1,7 М.
What is IoT? Understanding IoT Protocols, Clients and Management
53:11
Friendly Technologies - IoT & Device Management
Рет қаралды 178 М.
Zero Trust Architecture - Applying ZTA in Today’s Environment
52:23
SANS Cyber Defense
Рет қаралды 7 М.
Understanding and Getting Started with ZERO TRUST
57:11
John Savill's Technical Training
Рет қаралды 134 М.
Overview of Zero Trust Architectures
45:42
MIT Lincoln Laboratory
Рет қаралды 31 М.
CompTIA Network+ Certification Video Course
3:46:51
PowerCert Animated Videos
Рет қаралды 7 МЛН
Zscaler - Zero Trust Lab Demo
1:19:34
ATARC Channel
Рет қаралды 3,7 М.
She's very CREATIVE💡💦 #camping #survival #bushcraft #outdoors #lifehack
00:26