Episode Thumbnail
Episode 2  |  26:24 min

Building Zero Trust is Hard

Episode 2  |  26:24 min  |  06.23.2020

Building Zero Trust is Hard

00:00
00:00
This is a podcast episode titled, Building Zero Trust is Hard. The summary for this episode is: 2020's global Covid-19 pandemic has yet again thrust the concept of Zero Trust architectures into the security mainstream. Researcher, Builder, Hacker, Traveler, and Kenna's head of Security and Compliance, Jerry Gamblin discusses Zero Trust and the realities of the work required to truly adopt the architecture, probably bursting a few bubbles along the way.
Takeaway 1 | 00:44 MIN
Jerry Misses Travelling, A Lot
Takeaway 2 | 00:36 MIN
A Luddite's Explanation of Zero Trust
Takeaway 3 | 00:34 MIN
Zero Trust and The Castle & Moat Security Analogy
Takeaway 4 | 00:49 MIN
Quick History & Productization of Zero Trust
Takeaway 5 | 00:31 MIN
Google's Beyondcorp
Takeaway 6 | 01:47 MIN
Removing Safety Nets and an Aside on VPNs
Takeaway 7 | 01:32 MIN
SSO and the 1st Step in Zero Trust
Takeaway 8 | 02:43 MIN
Understanding User Behavior and Ramifications of British Baking Shows
Takeaway 9 | 00:24 MIN
Enterprise vs. Start-up Hurdles
Takeaway 10 | 01:45 MIN
Documentation and Business Buy-In
Takeaway 11 | 00:20 MIN
A Scale of Zero Trust Lite, To Zero Trust Nightmare
Takeaway 12 | 01:24 MIN
Are Companies Today Actually Realizing The Promise of Zero Trust?
Takeaway 13 | 02:02 MIN
Data Visibility Could Lead to Product Value Adds
Takeaway 14 | 05:12 MIN
The Fun Stuff: Documentation, Policy Creation, and Adherence
2020's global Covid-19 pandemic has yet again thrust the concept of Zero Trust architectures into the security mainstream. Researcher, Builder, Hacker, Traveler, and Kenna's head of Security and Compliance, Jerry Gamblin discusses Zero Trust and the realities of the work required to truly adopt the architecture, probably bursting a few bubbles along the way.

More Episodes

Exploit Prediction Scoring System - Now With Live Data

Establishing Defender Advantage w/ Cyentia Institute

How CIOs Get Things Done

Counting CVEs

Vulnerability Disclosure and Responsible Exposure

Risk, Measured: 7 Characteristics of Good Metrics