Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the evolving landscape of security policy enforcement in this 29-minute delegate roundtable discussion that examines where to best implement security controls across endpoints, networks, and cloud environments. Discover why traditional network-based enforcement remains crucial for unmanaged devices in universities and enterprises with IoT proliferation, while understanding how the fundamental shift from classic three-tier network architecture to cloud-internet-home models has eliminated traditional security choke points. Learn about Zero Trust as a necessary paradigm that treats every access request as a distinct transaction requiring authentication on both sides, moving beyond perimeter-based security to a consumer-resource interaction model. Understand the practical challenges of implementing Zero Trust in established brownfield environments, including the critical need to map every data flow and application interaction. Examine the "protect surface" strategy as a pragmatic approach to gradually applying Zero Trust principles to critical applications and datasets. Gain insights into how emerging technologies like AI may assist in mapping complex environments while introducing new risks and regulatory pressures, and understand why comprehensive environmental understanding remains fundamental to any successful enforcement strategy regardless of the chosen approach.
Syllabus
Security Field Day Delegate Roundtable: Enforcement
Taught by
Tech Field Day