Description |
1 online resource (1 streaming video file (6 min., 16 sec.)) |
Performer |
Presenters, Doug Barth and Evan Gilman. |
Note |
Title from title screen (viewed September 7, 2017). |
|
Date of publication from resource description page. |
Summary |
"Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges, and give suggestions on how to overcome them. You will get tips on why to involve more than just your security team, why implementing policy as code is important, understanding why you should evaluate policies for their impact and value, and the overall scale of change involved in moving from a perimeter model to a zero trust model."--Resource description page |
Subject |
Computer networks -- Security measures.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Computer networks -- Security measures. |
Added Author |
Gilman, Evan, on-screen presenter.
|
|