?? How is #AI Strengthening #ZeroTrust? A zero-trust security solution is based on the principle of granting no inherent trust and treats all users and devices as potential security threats. Read a great article published on the Cloud Security Alliance blog by Aparna Achanta: https://lnkd.in/gNf6fFdz
Zero Trust Journey
广播媒体制作和发布
Los Angeles,California 250 位关注者
Real Talk, Real Experts, Real Solutions.
关于我们
Zero Trust Journey is the go-to channel for cybersecurity professionals and leaders who want to explore real-world experiences, actionable insights, and practical advice about Zero Trust. In a world filled with vendor hype and buzzwords, we bring you candid conversations, research-backed discussions, and expert guest perspectives to help you navigate your Zero Trust adoption. Our episodes feature: |--- Educational Insights: Clear explanations of Zero Trust concepts and strategies. |--- Guest Experiences: Real-world stories of successes, challenges, and lessons learned. |--- ZT News Riff: Quick takes on the latest news and trends in the Zero Trust space. This channel is for you, whether you’re just starting your Zero Trust journey or looking to mature your strategy. Follow us for exclusive content, updates, and valuable Zero Trust resources. Learn more at https://ZTjourney.com
- 网站
-
https://ZTjourney.com
Zero Trust Journey的外部链接
- 所属行业
- 广播媒体制作和发布
- 规模
- 2-10 人
- 总部
- Los Angeles,California
- 类型
- 合营企业
- 创立
- 2023
- 领域
- Zero Trust、cybersecurity和information security
地点
-
主要
US,California,Los Angeles
Zero Trust Journey员工
-
Dr. Victor Monga
Cybersecurity Technologist & Architect | Experienced Practitioner | Public Speaker | Community Leader
-
Mallory Vega
Director Of Operations and Management at Virtually Testing Foundation
-
Zach Pugh
Product Leader | Security and Compliance Advisor | Co-Host of Zero Trust Journey Podcast | Proud Dad
动态
-
We’ve got a special edition webcast of #ZeroTrust Journey featuring the Microsoft #ZeroTrust workshop! This session is all about the #Identity Pillar —breaking down real-world challenges and how to navigate them. What you’ll learn: ?? Why identity is the foundation of #ZeroTrust ?? Best practices for Conditional Access, MFA, and Governance ?? How to secure privileged identities and reduce risk ?? A step-by-step roadmap for improving identity security This isn’t just for Microsoft shops—anyone working on #ZeroTrust can get value from this workshop. ?? Learn more: aka.ms/ztworkshop
Microsoft Zero Trust workshop | Identity Pillar
https://www.youtube.com/
-
Our very own Dr. Victor Monga, producer at Zero Trust Journey, will be speaking at the 2025 California AI-Cybersecurity Summit on February 28th. Join us as he explores “Embracing #ZeroTrust: Enhancing Security and Professional Growth.” Free registration: https://lnkd.in/gFgYH8Sk
-
-
Our own Steve Turner, host at Zero Trust Journey will be speaking at Office of the DoD Chief Information Officer's 3rd Annual Zero Trust Symposium on a topic that’s more relevant than ever; #ZeroTrust: Because Trust Issues Aren’t Just for Relationships. Traditional security models are outdated, and Zero Trust is the modern approach that ensures every access request is authenticated, authorized, and encrypted—no assumptions, no exceptions. Steve will share real-world lessons from Zero Trust implementations, what works, what doesn’t, and how organizations can navigate the challenges of adopting this model. He’ll cover everything from technology and vendors to internal processes and buy-in from leadership. If Zero Trust is on your radar, this is a session you don’t want to miss. Catch Steve at https://lnkd.in/gFzaBkYb. #Cybersecurity #ZeroTrust
-
-
Data privacy with Zero Trust! After reading the Cloud Security Alliance Zero Trust Privacy Assessment and Guidance, here’s my advice to safeguard your organization's critical data: ? Define your data "protect surface" ? Trace the ingress and egress of sensitive information ? Build a robust Zero Trust architecture that brings security closer to your data ? Enforce strict policies to allow only authorized access ? Continuously monitor technical assets for optimal security Discover how these steps work together to secure your most valuable information. #ZeroTrust #DataPrivacy #CyberSecurity #TechInsights
-
Introducing Cloud Security Alliance #ZeroTrust Privacy Assessment and Guidance! Are you looking to level up your data protection and privacy game? Dive into CSA’s brand-new Zero Trust Privacy Assessment and Guidance. Discover how Zero Trust principles can fortify your organization’s data security, ensure compliance, and safeguard sensitive information in a rapidly changing landscape. Highlights you’ll get from this guidance: ?? Actionable strategies for integrating Zero Trust with privacy requirements ?? Best practices for robust data governance and risk management ?? Step-by-step approaches to privacy impact assessments (PIAs) and DPIAs ?? Real-world insights to navigate evolving global regulations Read the full publication here: https://lnkd.in/giBpV4TE #ZTJourney #ZeroTrust #Privacy #DataProtection #Cybersecurity #Compliance #CSA
-
-
What Does Zero Trust Mean to You? #ZeroTrust has been a buzzword for years, but what does it actually mean in practice? In this episode of Zero Trust Journey, Dr. Victor Monga and Zach Pugh sit down with Drinor Selmanaj to talk about how companies define, implement, and—most importantly—validate their Zero Trust strategies. We get into: ? The myth of Zero Trust compliance—it doesn’t exist. ? How organizations claim to have Zero Trust but fall apart under real-world adversary testing. ? The importance of continuous validation—because security isn’t a one-time project. ? Why Zero Trust isn’t just a security model, but a culture shift that requires buy-in from leadership to engineers. Drinor Selmanaj often challenges his clients with a simple but tough question: 'What does Zero Trust mean to you?' If your answer is just a list of tools, you might be missing the point. Listen in, and challenge your assumptions.
Episode 11: What Does Zero Trust Mean to You?
https://www.youtube.com/
-
#ZeroTrust Pop Quiz! Think you're a #ZeroTrust expert? Test your knowledge!
此处无法显示此内容
在领英 APP 中访问此内容等
-
MITRE ATT&CK does not describe an attack. ATT&CK is a knowledge base of known adversary behaviors - tactics and techniques. An attack is made up of a sequence of ATT&CK Techniques. To understand an attack you must look at the full sequence. Attack Flow is a data model for representing these sequences of techniques. Using Attack Flow will allow you to better understand, communicate, and defend against attacks. The team at dogesec just published an excellent blog on Attack Flow and their plans to automate Attack Flows. Check it out -> https://lnkd.in/ezaPN4rB #ThreatInformedDefense #AttackFlow
-