Join us as we delve into the world of Zero Trust security with Dr. Natalia Semenova, a seasoned cybersecurity expert.
In this episode of podcast, we have discussed the key differences between Zero Trust and traditional defense approaches, the challenges organizations face while adopting Zero Trust, and practical strategies for overcoming these hurdles. Learn how to prioritize security areas, gain buy-in from stakeholders, and provide secure data access in the new normal “remote-first” cultures. We also explore the importance of security maturity models, the levels of maturity, and how to map them to your overall security architecture. Also discover the latest trends in AI security and how to get started with threat modeling.
You can read the complete transcript of the epiosde here >
Learnings from the podcast
- Zero Trust is a continuous journey. It’s not like a set it and forget it type of program. Organizations need to invest not only to set it up initially but also to keep monitoring and improving the program.
- For adoption of zero trust, some of the biggest challenges arise from Assets discovery and Identities discovery. Having a clear picture of all the assets, identities and their role in the overall organization.
- Identity is a core component of Zero Trust. IAM Assessment and Segregation (between Humans, Non-Humans and External Identities) help organizations understand the Attack Surface and plan for the best possible Zero Trust Policy.
Learning resources recommended by Natalia Semenova
-
National Coordinator For Critical Infrastructure Security And Resilience | CISA
CISA’s Zero Trust Maturity Model is one of many roadmaps that agencies can reference as they transition towards a zero trust architecture. The maturity model aims to assist agencies in the development of zero trust strategies and implementation plans and to present ways in which various CISA services can support zero trust solutions across agencies.
Know more about CISA’s Zero Trust Model >
-
STRIDE Model
STRIDE is a model for identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic for security threats in six categories.
Know more about STRIDE on Wiki >
-
Security Chaos Engineering
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering.