Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over “Zero Trust.” Zero Trust means looking at all processes in an organization or business to validate one’s data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, “How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?” (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, “Identity,” “Device,” “Network Environment,” “Application Workload,” and “data.” Dr. Shawn Murray Defines these five pillars as “This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly.” (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people’s impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today’s episode.
Visit Our Sponsors:
IEEE Digital Privacy
Previous Episodes:NCF-319 Cloud Security with Kubernetes
NCF-IEEE12 Global Efforts in Digital Privacy
NCF-318 Security Orchestration Automation and Response
NCF-317 Cybersecurity Buzz words
NCF-316 Recapping What We heard from our Guest in 2022
NCF-315 FAA Grounding Incident
NCF-314 Status of Cybersecurity for Critical Infrastructure
NCF-313 The Future of Cybersecurity
NCF-IEEE11 Applying Smart Contracts to the Energy Space.
NCF-IEEE10 Advancments of Health Technology and Cybersecurity