Implementing a Zero Trust Architecture for System Security
Course
Jay Moloo of DB Schenker discusses implementing zero trust architecture in OT environments through network segmentation and modern standards.
The zero trust approach to cybersecurity involves constantly evaluating every step of a digital connection and doing away with implicit trust in order to secure an organization. Consequently, a zero trust is becoming imperative for us to adapt in our strategies. This session will explore why a good security architecture is necessary for our end user’s OT strategies. It will analyze:
- How a zero trust approach can translate well from an IT to OT perspective
- What the best approaches are for adopting a zero trust approach in OT environments
- Where are the long-term benefits of network segmentation and zero trust
- Where network segmentation can be utilized to help complement a zero trust outlook
Here is the course outline:
Implementing a Good Zero Trust Security Architecture to Ensure Our Systems Remain Secure |