Beyond Perimeters - Implementing Zero Trust at Enterprise Scale
Overview
Syllabus
00:00 Introduction and Overview
00:50 The Evolving Digital Landscape
01:36 The Business Case for Zero Trust
02:19 Principles of Zero Trust
02:56 Identity-Centric Security
03:43 Micro-Segmentation and Contextual Access Policies
05:44 Current State of Zero Trust Adoption
06:21 Federated Identity Management
07:29 End-to-End Encryption
08:22 Distributed Policy Enforcement
09:54 Comprehensive Observability
11:48 Service Mesh Integration
14:21 API Security in Zero Trust
16:13 Overcoming Implementation Challenges
18:23 Conclusion and Closing Remarks
Taught by
Conf42