Artwork

Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

NCF-321 Part 2 of Zero Trust

9:07
 
Share
 

Manage episode 358792754 series 2362391
Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier

Visit our sponsors:

BlockFrame Inc.

IEEE Digital Privacy

  continue reading

106 episodes

Artwork

NCF-321 Part 2 of Zero Trust

New Cyber Frontier

23 subscribers

published

iconShare
 
Manage episode 358792754 series 2362391
Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier

Visit our sponsors:

BlockFrame Inc.

IEEE Digital Privacy

  continue reading

106 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide