A Guided Approach Towards a Zero-Trust Architecture


Details
Join us to learn about CSA-DC chapter Research paper on "A Guided Approach Towards a Zero-Trust Architecture"
*** Look out for the announcement on an exciting research topic and how you can be part of it. ****
𝐌𝐨𝐝𝐞𝐫𝐚𝐭𝐨𝐫: Dr. Mari J Spina
𝐏𝐚𝐧𝐞𝐥: Jyoti (Jodi) Wadhwa, Paul Deakin, Uma Rajagopal
𝐃𝐚𝐭𝐞: Wednesday, March 16th, 12-1 PM ET
𝐑𝐞𝐠𝐢𝐬𝐭𝐫𝐚𝐭𝐢𝐨𝐧:
𝐀𝐛𝐨𝐮𝐭 𝐭𝐡𝐢𝐬 𝐭𝐚𝐥𝐤
The CSA-DC Chapter Research Committee is dedicated to solving critical problems facing the Government and highly regulated business sectors important to our membership. As organizations contend with complying with a federal mandate, developing modernization journeys to the cloud and implementing resiliency from new attack vectors, the lead authors of this paper from the CSA-DC Chapter published a guided approach on how organizations can navigate a highly complex environment to develop a Zero Trust (ZT) strategy.
Zero Trust Architecture (ZTA) has been a goal for enterprise IT for a decade. Even with broad support from the IT vendor community, the reality of ZTA is still ambition rather than reality for large enterprises. Modern micro-services and hybrid cloud based architectures compound the challenge by increasing system complexity and adding operational costs for synchronization and orchestration of cybersecurity policy. This paper explores the options enterprises have to deliver a ZTA for granular access control spanning multiple clouds, on-premises environments, and end-point level security.
In a Panel format, We will discuss today few highlights on the topic of the Publication as well as the collaboration of the publication through our chapter and how you can be part of any future research projects.
1 CPE Credit Eligible*
- CPE credit eligibility: Email operations@cloudsecurityalliance-dc.org anytime prior to the start of the webinar to request CPE credit. Must attend live viewing of the webinar for a minimum of 45 min for 1 hour session. CPE certificates will be emailed within 72 hours of the end of the webinar to those requested.

A Guided Approach Towards a Zero-Trust Architecture