Skip to content
Explore All

Ensuring Data Security With Zero Trust Architecture Model


Course
Enroll

Sharique Raza, senior security architect at Financial Institutions UAE, explores the shift from implicit trust to zero trust architecture, detailing the five key pillars of zero trust implementation.

The traditional implicit trust model in cybersecurity - where users inside a network are automatically trusted - has proven vulnerable to ransomware attacks and lateral movement by threat actors. Zero trust architecture replaces this with a "never trust, always verify" framework applicable to all users regardless of position or location. This session examines the five essential pillars of zero trust: identity verification through multi-factor authentication, device security through proper inventory management, network security via microsegmentation and encryption, application security through secure coding practices, and data protection through classification and encryption.

  • Data classification and encryption strategies;
  • The 2020 SolarWinds Orion supply chain attack case study;
  • Practical implementation steps for organizations to implement zero trust.

Here is the course outline:

Ensuring Data Security With Zero Trust Architecture Model