Zero Trust Security for Cloud


Details
TO RESERVE A SPOT, YOU HAVE TO SIGN UP HERE TOO: https://zerotrustcloud.eventbrite.com
Abstract:
While legacy models for security assigned trust based on network location, e.g. datacenter vs. branch-office, corporate vs. remote, Zero Trust models focus on users and context. Zero Trust moves the responsibility for security from the network perimeter toward the data itself. This is particularly important in the cloud. You now need to understand how to secure each and every stage of an interaction within the context of the request.
Outline:
Introduction - Problem setup
Capturing Full Context: the identity of the user, the state of the device making the request, the app being used, and the sensitivity of data the request is trying to access; Gathering context through metadata
Applying Policies Based on Context
Analytics: Creating your audit trail; Logging every aspect of the request
Demos: HIPAA; GDPR; Cloud Copy - Protecting data across S3, GCS and Azure
Tools: Cloud Copy Tool; Cloud Connectors; Google EKM
Q&A

Zero Trust Security for Cloud