TEC37 Security Series E01: Would Zero Trust Have Prevented the SolarWinds Breach?
Event Overview
Zero Trust is a framework that combines Identity and Access Management (IAM), Enterprise Segmentation and other security components to provide "least access" protection to corporate networks and resources. WWT Cybersecurity architects Steve Brodson, Ricky Boyd and Ken Dunham join host Robb Boyd to discuss the key ways in which a Zero Trust Architecture could have protected against the Solar Winds-based attacks that made the news in December.
What to expect
- Why the Solar Winds attacks were so damaging
- The elements of Zero Trust Architectures
- How Zero Trust Architectures address the methods utilized in these attacks, including entry vectors, lateral movement and dwell time
- How WWT employs its proven methodology to help customer incrementally deploy Zero Trust principles in their enterprise
- How Zero Trust Architectures can be deployed in different verticals, such as Global Service Providers, to provide least privilege protection
Goals and Objectives
After attending, you will have better insight into how a Zero Trust Architecture can be deployed incrementally to protect your enterprise against new cyber attacks.
Who should attend?
This episode is targeted toward business and technology decision makers in medium to large enterprises, including Chief Information Officer, Chief Technology Officer, Chief Information Security Officer, Chief Executive Officer, VP/Director of Cloud, Director of IT and VP/Director of Applications.
Presenters
Explainerds.net
Chief Nerd
World Wide Technology
Sr. Consulting Solutions Architect
World Wide Technology
Cybersecurity Architect
World Wide Technology
Principal Consultant
Related content
Strategic Actions You Can Take After SolarWinds
I Use SolarWinds, What Do I Do Now?