SIGS Mentoring Program
Zero Trust Workshop (1 day)
1. Overview of exactly how malware spreads between workloads. Not focusing specifically on the intention of malware, but rather on the limited number of methods all threats rely on to move. And focusing on the technical details involved in this movement, with specific malware examples.
2. Overview of specific methods used to limit the ability of malware to move, with the focus being on the technical details on how to do so, rather than focusing on specific cybersecurity vendors.
3. Session on technical options for visibility, across all network fabrics, not just on Data Center or Cloud or Endpoints, but how to see as big of a picture as possible without becoming overly-complex.
4. Hands-on session on how to see what’s going on across all environments, using Illumio’s tools as an example .
5. Hands-on session on integrating multiple vendor tools together, for a holistic approach to preveting the spread of malware.
Despite spending dramatically more money every year to try to reduce cybersecurity incidents, they only keep increasing. They never decrease. Zero Trust is an idea in which all resources are their own local trust-boundary, whether they are hosted in Cloud, in Data Centers, or on Endpoints. All of these resources have a default-deny Policy model created, with exceptions enabled only as required. But despite many people applying this security model, cybersecurity incidents keep happening anyway.
Broadly speaking, there are 2 places on which Zero Trust can be applied: on the workloads themselves, or on the segments between the workloads. Most current Zero Trust solutions follow the first approach, trying to protect the resources from threats. This is important, but by the time an infected resource has been scrubbed of a threat, that threat will have spread to all other resources, and you now have a bigger problem. Zero Trust needs to focus on the common dependencies which all threats rely on to spread, in order to prevent a small problem from escalating into a big problem .
Zero Trust needs to begin with enforcing the segment, as the foundation of the Zero Trust architecture. All threats rely on segments to move, both the threats of today and the much-feared AI-generated threats of tomorrow. Since we know that all threats share one thing in common - relying on the segment - Zero Trust needs to monitor all activity on all segments.
This task of monitoring the segment involves several details, and this workshop will go over these details, demonstrating specific practical examples of how to implement the theory of Zero Trust. This won’t be simply slideware, but will be hands-on access to using Zero Trust Segmentation tools to discover, monitor, and take action on a segment for a variety of threats, over a variety of resources.