Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Master AI & Data—50% Off Udacity (Code CC50)
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to establish a comprehensive source of truth for application architectures and implement layered threat modeling approaches to enhance Zero Trust security frameworks in this 50-minute conference presentation from RSA Conference. Explore the challenges organizations face in mapping logical and physical topology of their application architectures while identifying transaction flows for Zero Trust protect surfaces. Discover practical design patterns for collecting and capturing data flow diagrams and security architectures at enterprise scale. Examine how technology-driven threat modeling can be systematically layered to create effective downstream Zero Trust workflows and policy implementations. Gain insights into overcoming the limitations of existing approaches through innovative methodologies that bridge the gap between threat modeling and Zero Trust architecture deployment.
Syllabus
Layering Threat Models to Drive Zero Trust Policies and Solutions
Taught by
RSA Conference