Zero Trust, Compliance And the TLS Blind Spot
Modern cyberattacks are not limited to network intrusions from outside by hackers. "Internal threat actors" can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.
The Zero Trust model, based on the simple principle of "trust nobody", defines rules which enhance the security of networks against modern cyberattacks, whether they are initiated from the outside or within. However, with most of the internet traffic being encrypted, it is becoming increasingly difficult to implement the Zero Trust model in an effective way.
The session will cover:
- The role of "internal threat actors" and TLS encryption in modern cyberattacks
- How the Zero Trust model defines the future of cybersecurity
- Why effective decryption is essential for a fool proof Zero Trust strategy