9:20 AM Integrating Zero Trust Networks
Internet 1.0 servers and endpoints were static. Internet 2.0 servers were static and endpoints were mobile. In the Internet 3.0 world, servers utilizing cloud, containers and "serverless" apps and endpoints (mobile devices, tablets, IoT, etc.) are highly mobile. A new security architecture needs to be implemented to address these new requirements. The traditional perimeter-based security architecture used in various sectors (edu, gov, com, org, etc.) has basically failed to protect internal assets. New technologies such as IoT and mobile devices will force a new approach to network security architecture. Zero-trust networks (ZTNs) assume that the network is hostile, attackers are already inside the net, and segmentation isn't sufficient for determining trust among other characteristics. This talk will describe zero-trust network properties and how we are integrating this architecture with existing cybersecurity defense strategies. We believe all sectors will have to adopt this strategy in the near future.