Zero Trust architecture, Implementation & Maturity Model

 View Only

Latest Discussion Posts

  • Team, Following up on some of our discussion on the "value" of Zero Trust. Here is an interesting blurb supported by IBM's data... Six Ways to Secure Your Organization on a Smaller Budget (securityintelligence.com) 3. Move to a Zero Trust ...

    1 person likes this.
  • As Jason indicated in his notes from the prior 2/23 call, he cleaned up the rough draft "business value notes document and assembled a draft outline for the group to review. There was an excellent ZT WG informational presentation on 33 related to ...

  • Hello folks - a reminder that our next ZT Workstream 9 meeting is this Thursday, March 9, at 8AM ET . This is the ZT9 - Zero Trust Architecture, Implementation and Maturity Model working group AM call. Recurs every 4 weeks and is complemented by ...

    1 person likes this.
  • Why I maintain that ZT must start at the network front door is because the growing vulnerability is operational systems, e.g. manufacturing, followed by energy utilities as leading the number of attacks. Why? It is clear that national stability is a ...

  • Great meeting tonight, it was the first ZT9 sub-committee meeting I've joined and I'm humbled and excited to be a part of this group. I'm new to the group so curious if there's a typical approach folks have been taking to brainstorm, collaborate, and ...

    2 people like this.

Latest Shared Files

Log in to see this information

Either the content you're seeking doesn't exist or it requires proper authentication before viewing.