What's NOT Included in Zero Trust Architecture



Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus these environmental elements are the basis for secure use of information resources, today and as a foundation for future growth. This session presents each of these elements as products to be evaluated, acquired and implemented in order to achieve full zero trust.


Learning objectives:

  • The various security methods that support ZTA but are not included in it.
  • The value proposition for a fully supported zero trust environment.
  • The vendor landscape of these supportive methods.
  • Determining the need for supplemental products and tools.

Speaker and Presenter Information

Steven Ross, Executive Principal | Risk Masters International

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register as Attendee


Add to Calendar


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, May 15, 2024, 11:00am - 12:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
BrightTalk Information Technology



Return to search results