Perimeter security and other architecture models continue to fail us. The truth is users and systems continue to accumulate access over time, and the inside of a network tends to be wide open for the picking. Instead of designing defenses around an outdated architecture come and learn about zero trust architecture. Zero trust allows you to stray away from the old saying of \trust but verify" and instead switch to a "verify all" approach. No budget, no worries.
This presentation focuses on implementing zero trust with systems and software you already own. What can I say, blue team is awesome!
Join Justin Henderson at the SANS Tactical Detection & Data Analytics Summit & Training, December 4-11, in Scottsdale, AZ. As the Summit co-chair, Justin will lead two days of presentations and panel discussions that demonstrate how high-value log sources, monitoring tools, and sound analysis techniques can be leveraged to detect bad in your network. Following the Summit, take SEC530: Defensible Security Architecture with Justin and learn to build and maintain a truly defensible security architecture.
Check out all other upcoming opportunities to take SEC530: Defensible Security Architecture