Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Beyond Perimeters - Implementing Zero Trust at Enterprise Scale

Conf42 via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore enterprise-scale Zero Trust security implementation in this 19-minute conference talk from Conf42 ML 2025. Discover how the evolving digital landscape necessitates moving beyond traditional perimeter-based security models to embrace Zero Trust architecture. Learn the fundamental principles of Zero Trust, including identity-centric security approaches, micro-segmentation strategies, and contextual access policies that verify every user and device regardless of location. Examine the current state of Zero Trust adoption across organizations and understand the business case for implementing this security framework. Dive into technical implementation aspects including federated identity management, end-to-end encryption protocols, and distributed policy enforcement mechanisms. Understand how comprehensive observability and monitoring integrate with Zero Trust principles to provide continuous security assessment. Explore service mesh integration patterns and their role in Zero Trust architectures, along with specific considerations for API security within Zero Trust environments. Address common implementation challenges organizations face when transitioning to Zero Trust and learn practical strategies for overcoming these obstacles at enterprise scale.

Syllabus

00:00 Introduction and Overview
00:50 The Evolving Digital Landscape
01:36 The Business Case for Zero Trust
02:19 Principles of Zero Trust
02:56 Identity-Centric Security
03:43 Micro-Segmentation and Contextual Access Policies
05:44 Current State of Zero Trust Adoption
06:21 Federated Identity Management
07:29 End-to-End Encryption
08:22 Distributed Policy Enforcement
09:54 Comprehensive Observability
11:48 Service Mesh Integration
14:21 API Security in Zero Trust
16:13 Overcoming Implementation Challenges
18:23 Conclusion and Closing Remarks

Taught by

Conf42

Reviews

Start your review of Beyond Perimeters - Implementing Zero Trust at Enterprise Scale

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.