2020-11-20, 14:00–14:50, Hackfest - Sponsor room (and workshops)
The buzz is there… Zero Trust, Gartner’s CARTA, Forrester’s Zero Trust Extended, Vendor X’s magical zero trust unicorn, etc; but what does any of this really mean to the security practitioner? In this session, I will provide clarity to all this noise, and discuss how a pure Zero Trust model was always intended to be, why and how that model provides for efficient security; the way it changes the paradigm of the problem we face securing our data and our workforce, and how ZT is completely complimentary to a threat-centric approach to security that we have been following for many years. Many approaches to ZT are focused only on situations where a user can interactively authenticate. However, ZT does not end with just strong authentication of users. Machine-to-machine connections have grown to nearly 50% of all connections, and many ZT architectures can often ignore these headless devices and workloads.