Deploying a Zero Trust Overlay in your Current DCO Environment

Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move network defenses from static, network-based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan enterprise infrastructure and workflows.

In this presentation you’ll learn:

  • Quick Level Set on Zero Trust
  • Where to Start with Zero Trust Architecture
  • Overlaying Zero Trust  on top of current Defensive Cyber architecture
  • How to build a Zero Trust Policy that matters
  • Choosing the correct Sensors & Enforcement Points to enforce policy
  • What are the largest challenges in creating a Zero Trust Strategy (Conditional Access, Mobile, O365, ICAM, etc…)
  • The role of Technology Integration in Zero Trust Architecture

Download the full presentation:
ThunderCat’s Zero Trust Approach