Zero Trusted Networks or: Why Perimeter Security is Dead

  • Date 06 Jun 2019

Zero Trusted Networks or: Why Perimeter Security is Dead

06 Jun 2019, 14:05 - 14:30

Cyber Innovation Showcase
Language:
English

Download Presentation

Traditional IT network security is based on perimeter security. Perimeter security makes it hard to obtain access to the network, but everyone inside the network is implicitly trusted. Once an attacker gains access, they have free reign over everything inside. With the advent of cloud computing, microservices, remote work, and distributed services this model is not sufficient anymore. As an alternate approach, zero trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.

Learning Outcomes:

  1. Understanding attack vectors for perimeter secured networks.
  2. Understanding why perimeter security is not sufficient anymore.
  3. Learn about the holistic concept of zero trust networks.
  4. Understand how the Zero trust networks approach helps to mitigate current attack vectors.
  5. Take a new and fresh view on network security.

 

Contributors

  • Jochen Kressin

    Speaker

    Co-Founder & CTO

    floragunn GmbH

    I am the founder and CEO of Search Guard, an Enterprise Security Suite for the Elastic Stack.   With over 18 years of work experience, I possess deep...

Business Issues covered

  1. What will this session help you to do?
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Floragunn GmBH

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.