ZTA Unpacked: The Critical Technical Components of Zero Trust Architecture

Webcast 5 of 5 in our Special Series—Explore the full lineup here.

Join Greg Scheidel as he demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations. 

What We’ll Discuss:

  1. A technical breakdown of Zero Trust principles and how they’re enforced in real-world environments
  2. How to identify and evaluate the technologies that support a mature ZTA
  3. Key architectural components: segmentation gateways, ICAM, local host security, SIEM/SOAR, and more
  4. How Zero Trust applies across CISA’s maturity model pillars: identity, devices, networks, workloads, and data
  5. What it means to reject implicit trust, embrace the presumption of compromise, and continuously verify

Why Register:

  • Learn from industry experts 
  • Submit your questions to webcast speakers (When attending live)
  • Earn CPE credits 
  • Flexible access (Join live or watch the replay on your own time)

Bonus: All registrants will receive the full whitepaper written by Greg Scheidel for deeper insights and references.

Thank You to Our Sponsors

Broadcom_Corporation-Logo.wine.png