https://cloudsecurityalliance.zoom.us/rec/share/3Pak1nHIU0_SV6sUxmY7JzWBACbmNUs15KWrrLqisHw9duigYsULf8exs_6A0q9X.9dF6ha1bhkSFroF2Passcode: ZTimplement101!
Our senior subject matter expert advisor and the founder of Zero Trust has graciously offered to provide several briefings and panel discussions to help our CSA ZT research working group level set, focus and accelerate our efforts.This first session on Zero Trust Implementation and Guiding Principles will cover John's recommended approach for ZT Implementation (5 steps), tenets and guiding principles.
For background and reference see page 7 of "The President's NationalSecurity Telecommunications Advisory Committee Report":
https://www.cisa.gov/sites/default/files/publications/NSTAC%20Report%20to%20the%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Management.pdf
This content aligns with the scope of ZT workstreams #1 and #9, but is open to the entire CSA ZT research working group, leadership team and Circle community.------------------------------
Erik Johnson CCSK, CCSP, CISSP, PMP
Senior Research Analyst
Cloud Security Alliance
Leesburg VA
------------------------------