The journey to Zero Trust
The idea behind Zero Trust that it’s almost impossible to truly tell a bad actor from a good one when it comes to cybersecurity threats.
So, as a security framework, the mantra behind Zero Trust is essentially “trust no one.” That means that before giving permission to access data or applications, etc., all users must authenticate and then routinely re-authenticate to continue access.
The traditional way of granting access has been based on the idea that once a “solid perimeter” was created around a system to keep the “bad people” out, access would be granted one time.
But as systems and resources become more interconnected or possibly exist outside the perimeter, giving implicit trust could allow malevolent actors to access and siphon sensitive data. The edge to a network or system no longer works as a metaphor since networks can be local, in the cloud, or a hybrid. Therefore, treating “resources” as one entity with one access point is problematic.
REN-ISAC is hosting a webinar on the topic of Zero Trust open to both members and the public, “Every Step Matters – 5 Things you can do right now to start your Zero Trust Journey with Palo Alto Networks,” on October 5 as part of National Cybersecurity Awareness Month.
About the webinar:
As the proverb goes, “a journey of a thousand miles starts with a single step,” so does your zero trust journey. Join SMU CISO George Finney, in a discussion with David Cumbow, Education Architect at Palo Alto Networks, on the changing nature of cybersecurity and why zero trust is so important to the future of your institutions. Their discussion will center around what zero trust is (and is not), the importance of building a Zero Trust strategy, and the top five things you can start working on right now. After attending this session, you will be ready to start making that journey a reality.
The 5 things:
• Build a cross-functional team that can implement Zero Trust throughout IT
• Understand what “aligning with the business” really means and how Zero Trust can help
• Focus on Identity as the cornerstone of your Zero Trust strategy
• Start using “Protect Surfaces” to bring focus to your Zero Trust implementation
• Start “Logging Everything” to help tailor your controls
About the speakers:
George Finney is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges. George is the bestselling author of several cybersecurity books, including the upcoming book “Project Zero Trust” and the Book-of-the-Year Award-winning “Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future.” George was recognized in 2021 as one of the top 100 CISOs in the world by CISOs Connect and has worked in Cybersecurity for over 20 years and has helped startups, global telecommunications firms, and nonprofits improve their security posture.
David Cumbow is the Palo Alto Networks Principal Solutions Architect focused on State/Local Government and Education organizations throughout the US with experiences across the whole I.T. ball field. David used to be a customer for 6 years, where he previously worked as the networking and security leader at Moreno Valley USD. He left the district in 2016 and joined Palo Alto Networks to become a Systems Engineer, Engineering Manager, and now Principal Solutions Architect.