
Sign up to save your podcasts
Or
In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misinterpretations surrounding Zero Trust, illuminating its role as not just a defensive strategy but a comprehensive approach to modern threats.
Zero Trust operates on the principle of "never trust, always verify," but what does this mean in practice? Zero Trust doesn't just look outward; it recognizes that threats also come from the inside. By assuming that a breach is not just possible, but has already happened, Zero Trust strategies are uniquely positioned to mitigate damage by insiders, whether malicious or accidental.
Follow on Twitter (X): @privacypod
Support the show: https://www.patreon.com/TheLockdown
This episode was recorded on November 09, 2023
This week's episode:
NIST Zero Trust Architecture (SP 800-207): https://csrc.nist.gov/pubs/sp/800/207/final
CISA Zero Trust Maturity Model: https://www.cisa.gov/zero-trust-maturity-model
Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Intro music: The Lockdown
"Security is always seen as too much until the day it is not enough." — William H. Webster
Official Website: https://psysecure.com
Podcast music: The R3cluse
4.8
2525 ratings
In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misinterpretations surrounding Zero Trust, illuminating its role as not just a defensive strategy but a comprehensive approach to modern threats.
Zero Trust operates on the principle of "never trust, always verify," but what does this mean in practice? Zero Trust doesn't just look outward; it recognizes that threats also come from the inside. By assuming that a breach is not just possible, but has already happened, Zero Trust strategies are uniquely positioned to mitigate damage by insiders, whether malicious or accidental.
Follow on Twitter (X): @privacypod
Support the show: https://www.patreon.com/TheLockdown
This episode was recorded on November 09, 2023
This week's episode:
NIST Zero Trust Architecture (SP 800-207): https://csrc.nist.gov/pubs/sp/800/207/final
CISA Zero Trust Maturity Model: https://www.cisa.gov/zero-trust-maturity-model
Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Intro music: The Lockdown
"Security is always seen as too much until the day it is not enough." — William H. Webster
Official Website: https://psysecure.com
Podcast music: The R3cluse
1,986 Listeners
639 Listeners
263 Listeners
183 Listeners
1,018 Listeners
317 Listeners
405 Listeners
7,951 Listeners
173 Listeners
315 Listeners
77 Listeners
129 Listeners
75 Listeners
169 Listeners
314 Listeners