Artwork

Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

NCF-320 Zero Trust

29:45
 
Share
 

Manage episode 357870682 series 2362391
Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Dr. Shawn Murray Defines these five pillars as "This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly." (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people's impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today's episode.

Visit our sponsors:

BlockFrame Inc.

IEEE Digital Privacy

  continue reading

106 episodes

Artwork

NCF-320 Zero Trust

New Cyber Frontier

23 subscribers

published

iconShare
 
Manage episode 357870682 series 2362391
Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Dr. Shawn Murray Defines these five pillars as "This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly." (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people's impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today's episode.

Visit our sponsors:

BlockFrame Inc.

IEEE Digital Privacy

  continue reading

106 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide