Episode 39: ZTMM+ How to Assess and Roadmap Zero Trust
Автор: Zero Trust Journey
Загружено: 2026-02-13
Просмотров: 9
Описание:
00:00 Introduction to Zero Trust Journey
01:06 Understanding Zero Trust Maturity Models
02:47 Evolution of ZTMM+ and Future Plans
04:25 Challenges in Achieving Zero Trust Maturity
06:22 Prioritizing Zero Trust Implementation
09:41 Fictitious Company Assessment: Precision Dynamic Manufacturing
12:00 Exploring Identity Pillar Functions
17:01 Network Segmentation and Governance
20:10 Maintaining Access Policies
22:31 Cloud and SaaS Considerations in Zero Trust
23:16 Integrating SaaS Platforms for Enhanced Security
25:48 Starting the Zero Trust Journey
28:28 Progressing Through Authentication Levels
31:17 Understanding Identity Functions
33:10 Network Segmentation and Access Control
36:59 Building Trust Through Zero Trust Strategies
"Zero Trust is not a journey where you have to spend a lot of money upfront before you can get started. In almost every case, you just need to use what you have better."
In this workshop-style episode of the Zero Trust Journey, Dr. Victor Monga sits down with Jason Garbis and Jerry Chapman from Numberline Security. They move beyond the theory to conduct a live Zero Trust assessment of a fictitious company, "Precision Dynamic Manufacturing" (PDM). From "sticky note" admin passwords to flat networks where CNC machines and Wi-Fi guests coexist, Jason and Jerry map out a practical, no-fluff roadmap to maturity.
▶ IN THIS EPISODE, WE COVER:
▶ The ZTMM+ Framework: Why the standard CISA model needed an upgrade and how "Governance" acts as the critical glue across all five security pillars.
▶ The PDM Case Study: A deep dive into an SMB with 200 employees—evaluating the risks of an IT stack built by the "neighbor's kid" and how to secure it before a CMMC audit.
▶ MFA is Non-Negotiable: Jerry breaks down the journey from simple SMS codes to phishing-resistant authentication and why it’s the single most important move for identity.
▶ Stop Buying, Start Configuring: How to leverage your existing Microsoft Entra ID (Azure AD) stack to achieve Zero Trust principles without a massive capital investment.
▶ Network Segmentation for OT: Practical strategies for isolating "crusty" legacy hardware and CNC machines from the rest of the enterprise to stop lateral movement.
▶ Building External Trust: How a mature Zero Trust posture directly impacts your ability to secure cyber insurance and win contracts with security-conscious partners.
Connect with the Guests:
Jason Garbis: / jasongarbis
Jerry Chapman: / jerrychapman
Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges: / zero-trust-journey
👉 Learn more at: ztjourney.com
Disclaimer:
The views and opinions expressed in this episode are those of the speakers and do not necessarily reflect the official policy or position of any affiliated organization. This content is provided for informational purposes only.
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: