Skip to content
Banking & Financial Services

A Zero Trust Implementation Case Study


Course
Upgrade subscription below

Imran Khan shares insights on risk-based scoping of critical assets, network segmentation for granular workflow policies, identity micro-classification for authentication, and quarantine subnets isolating non-compliant devices for automated patching.

The accelerating adoption of artificial intelligence by threat actors represents a paradigm shift in the cyberthreat landscape, rendering traditional perimeter-based security models fundamentally obsolete. AI-powered attacks leverage automated vulnerability discovery, hyper-realistic social engineering (e.g., deepfake phishing), and adaptive malware that can learn to evade static defenses.

Effective zero trust starts with risk-based scoping of critical assets rather than attempting to secure entire networks simultaneously.

In this session, Imran Khan of BNP Paribas will share insights on:

  • Network segmentation as the enforcement point for granular policies targeting specific workflows such as claims processing;
  • Identity micro-classification distinguishing admin rights, power users and non-human accounts requiring different authentication policies and access controls;
  • Quarantine subnets isolating non-compliant devices for automated patching with alerts when legacy systems cannot update.
 

 

Here is the course outline:

From Perimeter to Policy: A Zero Trust Implementation Case Study

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button