Siirry offline-tilaan Player FM avulla!
NCF-321 Part 2 of Zero Trust
Manage episode 358792754 series 2362391
Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier
Visit our sponsors:
106 jaksoa
Manage episode 358792754 series 2362391
Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier
Visit our sponsors:
106 jaksoa
Kaikki jaksot
×Tervetuloa Player FM:n!
Player FM skannaa verkkoa löytääkseen korkealaatuisia podcasteja, joista voit nauttia juuri nyt. Se on paras podcast-sovellus ja toimii Androidilla, iPhonela, ja verkossa. Rekisteröidy sykronoidaksesi tilaukset laitteiden välillä.