Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Layering Threat Models to Drive Zero Trust Policies and Solutions

RSA Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to establish a comprehensive source of truth for application architectures and implement layered threat modeling approaches to enhance Zero Trust security frameworks in this 50-minute conference presentation from RSA Conference. Explore the challenges organizations face in mapping logical and physical topology of their application architectures while identifying transaction flows for Zero Trust protect surfaces. Discover practical design patterns for collecting and capturing data flow diagrams and security architectures at enterprise scale. Examine how technology-driven threat modeling can be systematically layered to create effective downstream Zero Trust workflows and policy implementations. Gain insights into overcoming the limitations of existing approaches through innovative methodologies that bridge the gap between threat modeling and Zero Trust architecture deployment.

Syllabus

Layering Threat Models to Drive Zero Trust Policies and Solutions

Taught by

RSA Conference

Reviews

Start your review of Layering Threat Models to Drive Zero Trust Policies and Solutions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.