Video description
In this video, Doug Barth and Evan Gilman describe what a zero trust network is, and why it is the natural evolution from the current best practice security models. Current network infrastructures are designed to protect your internal network with a firewall, and everything behind that firewall being "trusted" by default. zero trust networks are based on the philosophy that no network is trusted, be it external or internal. In this video, Doug and Evan discuss topics such as why it is important to move to a zero trust network model, what is driving the need to evolve security models, and what some of the benefits are for this type of network security model.
Doug Barth is a software engineer who loves to learn and share his knowledge with others. He has worked on systems of various sizes at companies like Orbitz and PagerDuty. He has built and spoken about monitoring systems, mesh networks, and failure injection practices. Evan Gilman is an Operations Engineer with a background in computer networks. With roots in academia, and currently working in the public internet, he has been building and operating systems in hostile environments throughout his professional career. An open source contributor, speaker, and author, Evan is passionate about designing systems that strike a balance with the networks they run on.
Other videos in this series:
What are the advantages and disadvantages of a zero trust model?
What are the common challenges to adopting a zero trust network model?
Table of contents
- What is a zero trust network? 00:06:07
Product information
- Title: What is a zero trust network?
- Author(s):
- Release date: August 2017
- Publisher(s): Infinite Skills
- ISBN: 9781491998885
You might also like
video
CISSP®️ Certification Domain 3: Security Architecture and Engineering Video Boot Camp
Take the Domain 3 CISSP certifications boot camp: Get 7 hours of video, downloadable slides, & …
video
Certified Ethical Hacker (CEH), 2nd Edition
18+ Hours of Video Instruction Learn everything you need to know to pass the Certified Ethical …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
video
Python Fundamentals
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …