Artwork

محتوای ارائه شده توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

E18 – Building a Secure Network with the Zero Trust Blueprint

41:07
 
اشتراک گذاری
 

Manage episode 428959556 series 3555974
محتوای ارائه شده توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Introduction:

  • Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity.
  • Episode Overview: Discussion on Zero Trust security.

Segment 1: Conference Recap

  • Anthony's recent attendance at the IT conference for South Carolina co-ops.
  • Key takeaway: Importance of IT communication with non-IT stakeholders, avoiding jargon and using relatable examples.

Segment 2: Understanding Zero Trust

  • Zero Trust explained: "Never trust, always verify."
  • History of Zero Trust: Coined by John Kindervag in the 90s and popularized in the 2000s.
  • Shift in mindset: From securing trusted internal networks to assuming all networks are potentially hostile.

Segment 3: Key Concepts of Zero Trust

  • Basic principles: Never trust, always verify; least privilege; and assume breach.
  • NIST guidance on Zero Trust (800-207).

Segment 4: Implementing Zero Trust

  • Defining the protect surface: Identify what needs protection.
  • Mapping transaction flows: Understand how data moves.
  • Architecting Zero Trust: Building a secure infrastructure.
  • Creating Zero Trust policies: Setting rules and guidelines.
  • Monitoring and maintaining: Continuous improvement and vigilance.

Segment 5: Real-world Application

  • Anthony's recent project: Redesigning an OT environment using Zero Trust principles.
  • Challenges and solutions: VLAN segmentation, micro-segmentation, and user/device checks.

Segment 6: Lessons Learned

  • Importance of strategic goals: Integrating Zero Trust into organizational strategy.
  • Using existing tools effectively: Leveraging current technology to implement Zero Trust.
  • Practical tips: Start with test environments, prioritize critical applications, and consider business operations.

Segment 7: Pitfalls and Considerations

  • Usability impact: Balancing security measures with operational needs.
  • Internal threats: Monitoring for suspicious internal activities.
  • Continuous monitoring: Importance of regular checks and updates.

Segment 8: Resources and References

  • Recommended reading: "Project Zero Trust" book.
  • Key documents: NIST 800-207 and CISA's Zero Trust Maturity Model.

Conclusion:

  • Recap of the episode.
  • Encouragement to start the Zero Trust journey: Don't be overwhelmed; take it step by step.
  • Final thoughts: Zero Trust as a critical part of modern cybersecurity strategies.

Closing:

  • Reminder to check previous episodes.
  • Contact information: Website, email, and social media handles.
  • Episode release schedule: Every other Monday.

Sign-off:

  • Hosts' sign-off and thanks for listening.
  continue reading

55 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 428959556 series 3555974
محتوای ارائه شده توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Introduction:

  • Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity.
  • Episode Overview: Discussion on Zero Trust security.

Segment 1: Conference Recap

  • Anthony's recent attendance at the IT conference for South Carolina co-ops.
  • Key takeaway: Importance of IT communication with non-IT stakeholders, avoiding jargon and using relatable examples.

Segment 2: Understanding Zero Trust

  • Zero Trust explained: "Never trust, always verify."
  • History of Zero Trust: Coined by John Kindervag in the 90s and popularized in the 2000s.
  • Shift in mindset: From securing trusted internal networks to assuming all networks are potentially hostile.

Segment 3: Key Concepts of Zero Trust

  • Basic principles: Never trust, always verify; least privilege; and assume breach.
  • NIST guidance on Zero Trust (800-207).

Segment 4: Implementing Zero Trust

  • Defining the protect surface: Identify what needs protection.
  • Mapping transaction flows: Understand how data moves.
  • Architecting Zero Trust: Building a secure infrastructure.
  • Creating Zero Trust policies: Setting rules and guidelines.
  • Monitoring and maintaining: Continuous improvement and vigilance.

Segment 5: Real-world Application

  • Anthony's recent project: Redesigning an OT environment using Zero Trust principles.
  • Challenges and solutions: VLAN segmentation, micro-segmentation, and user/device checks.

Segment 6: Lessons Learned

  • Importance of strategic goals: Integrating Zero Trust into organizational strategy.
  • Using existing tools effectively: Leveraging current technology to implement Zero Trust.
  • Practical tips: Start with test environments, prioritize critical applications, and consider business operations.

Segment 7: Pitfalls and Considerations

  • Usability impact: Balancing security measures with operational needs.
  • Internal threats: Monitoring for suspicious internal activities.
  • Continuous monitoring: Importance of regular checks and updates.

Segment 8: Resources and References

  • Recommended reading: "Project Zero Trust" book.
  • Key documents: NIST 800-207 and CISA's Zero Trust Maturity Model.

Conclusion:

  • Recap of the episode.
  • Encouragement to start the Zero Trust journey: Don't be overwhelmed; take it step by step.
  • Final thoughts: Zero Trust as a critical part of modern cybersecurity strategies.

Closing:

  • Reminder to check previous episodes.
  • Contact information: Website, email, and social media handles.
  • Episode release schedule: Every other Monday.

Sign-off:

  • Hosts' sign-off and thanks for listening.
  continue reading

55 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش