Zero Trust Step Three: Build a Zero Trust Architecture
Автор: Threat Talks
Загружено: 2025-06-23
Просмотров: 138
Описание:
It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.
In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, and why this is the most operational step in your Zero Trust journey.
They cover:
✅ Why segmentation is one of the most important Zero Trust measures
🔒 How to choose and assign technical controls (and what matters most)
📄 How frameworks like MITRE ATT&CK, ISO 27001, and the Cyber Kill Chain help map risks to controls
From translating compliance requirements into actionable controls to whiteboarding micro-perimeters and network segments, this is where the vision meets the real world.
Shownotes:
⁃ Zero Trust Step 1 episode: • How to Start Zero Trust the Right Way | Th...
⁃ Zero Trust Step 2 episode: • Zero Trust Step 2: Map the Transaction Flows
⁃ Rick Howard episode on the Kill Chain / watch: v=GC8z3W2OSwQ&t=1s
⁃ Outlook Web Access Deep Dive episode: • Microsoft Outlook vulnerability CVE 2023-2...
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: / @threattalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUE...
► APPLE: https://podcasts.apple.com/us/podcast...
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: