Zero trust security

Monthly Security Update:

Understanding Zero trust Security

 

October 30, 2020, Online Workshop

9 Am – 16 :00 PM (6 CPE)

About
The Understanding Zero Trust Security

Zero Trust is a security concept based on the idea that organizations should not automatically trust anybody or any device that interacts with its network or systems. Each device must be verified as trusted before it can be allowed to be active member of the network.  So, the strategy around Zero Trust boils down to – don’t trust anyone.

 

 

WHO SHOULD ATTEND

  • CISO’s
  • Security Risk Managers
  • Security Engineers
  • Information Security Managers.
  • Information Security Directors.
  • All other security professionals who want to be kept up to date.

THE CONTENT

Since the start of networking, organizations have always protected themselves using perimeter security which involved building a protective shield around the assets to protect them. Lately, due to the proliferation of mobile devices the perimeters have shifted and as such a new way of thinking is required to protect the organization. Zero Trust Security is gradually replacing the traditional perimeter security way of thinking. This workshop focus on this new way of thinking about security. Learn about the fundamentals of Zero Trust Security and how to start off with the implementation in your company.

Content of the Workshop

  • What is a Zero Trust Network?
  • Zero Trust vs traditional perimeter security?
  • Why do we need Zero Trust Security?
  • What is Involved in the Zero Trust Security?
  • Why is the Zero Trust Model Important?
  • Understanding Network Segmentation
  • Implementing a perimeterless Design
  • Knowing Users and their Devices
  • Authenticating and Authorizing Users
  • The Pillars of Zero Trust Security
  • Device Trust
  • User Trust
  • Transport/Session trust
  • Application trust
  • Data Trust
  • The five steps to a Zero Trust network
  • Define your protect surface
  • Map the transaction flows
  • Architect a Zero Trust network
  • Create the Zero Trust policy
  • Monitor and maintain the network
  • A look at Zero Trust Security Model such as BeyondCorp
  • How to implement Zero trust Security.

At the end of this workshop participant will understand what Zero Security is and able to determine if it will be useful for their company and how to get started with it.

Registration

For a limited time we are offering you this free Security Workshop  Event without product sales or demonstation. We have limited seats. So Register fast to reserve your seat.

Let us know if you want to speak at one of our Cybersecurity Friday Event!

We are constantly looking for good speakers that can provide insights in cybersecurity topics that would benefit the community. If you are such a person please contact us for a conversation.

Sponsor A Cybersecurity

Friday Event.

10 + 5 =

workshops

workshops

Our Security Workshops and Events

Join us in one of our Events.

The Understanding Zero Trust Security

Zero Trust is a security concept based on the idea that organizations must verify anything before it can be part of the network communication.  So, the strategy around Zero Trust boils down to – don’t trust anyone. This workshop teaches participant to understand what Zero Security is and how to implement it.

Security Workshop: SDLC Threat Modelling

In this workshop our expert will take you through the basic questions involved in Threat Modeling. You will learn about the main ideas behind threat modelling and how to bring security and software development together in the SDLC and to collaborate on a shared understanding and development of the system.

Security Workshop: Practical Guide To Cloud Security And Migration

In this workshop our cloud security expert will be taking you through the building blocks of Cloud security. Where do you start? What to be bewared of, and what you need do right to have a successful secure cloud migration for your organization.

Understanding Data Loss Prevention (DLP)

Data Loss is one of the biggest security challenges faced by companies today. This pose significant risks to the organization. This one day program focuses on how organisation can use DLP systems to leverage security to protect their data in use and in transi.

CyberSecurity Friday COMING SOON

The Cybersecurity Friday is a weekly information security event that features top security professional who are willing to share their knowledge with the security community. It is an opportunity to learn from experience speakers from various areas within the cybersecurity arena.

SDLC Threat Modelling

Security Workshop:
Threat Modeling In Software Development Life Cycle (SDLC)

 

December 4, 2020, 10:00 AM – 12:00 PM Online Workshop (2 CPE)

Join us in our Threat Modeling workshop and learn how to manage security risk during system development.

About The Threat Modeling In SDLC Workshops

Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.

The purpose of threat modeling is to provide systematic analysis of what controls or defences need to be included to defend a giving system against potential attack, the probable attacker’s profile, the most likely attack vectors, and the assets most desired by an attacker.

 

WHO SHOULD ATTEND

  • CISO’s
  • Security Risk Managers
  • Security Engineers
  • Information Security Managers.
  • Information Security Directors.
  • All other security professionals who want to be kept up to date.

 

The Content

In this workshop our expert will take you through the process of Threat modeling and teach you to answer questions involved in the process such as

  • “Where am I most vulnerable to attack?”,
  • “What are the most relevant threats?”, and
  • “What do I need to do to safeguard against these threats?”.

You learn about the main idea behind threat modeling and how to bring security and software development together in the SDLC and to collaborate on a shared understanding and development of the system. We will also discuss the following:

  • Ensure business requirements (or goals) are adequately protected in the face of a malicious actor, accidents, or other causes of impact.
  • How to identify threats and compliance requirements, and evaluate their risk.
  • How to define and build required controls.
  • Learn to balance risks, controls, and usability
  • Identify where building a control is unnecessary, based on acceptable risk.
  • Document threats and mitigation.
  • Identification of security test cases / security test scenarios to test the security requirements

Free Registration

For a limited time we are offering you this free Security Workshop  Event without product sales or demonstation. We have limited seats. So Register fast to reserve your seat.

Let us know if you want to speak at one of our Cybersecurity Friday Event!

We are constantly looking for good speakers that can provide insights in cybersecurity topics that would benefit the community. If you are such a person please contact us for a conversation.

Sponsor A Cybersecurity

Friday Event.

8 + 9 =

en_USEnglish