Artwork

المحتوى المقدم من Mirantis Inc.. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Mirantis Inc. أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Interview with the Founder: Zero Trust Model founder, John Kindervag

31:59
 
مشاركة
 

Manage episode 475482353 series 3342345
المحتوى المقدم من Mirantis Inc.. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Mirantis Inc. أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In this episode of Radio Cloud Native, former host John Jainschigg, Director of Open Source Initiatives for Mirantis, returns to provide a great interview with one of the founders of the Zero Trust model for cybersecurity, John Kindervag. He has authored many blog articles and much of the open source documentation of Zero Trust, and is one of the most knowledgeable cybersecurity experts in the cloud space.

In the interview, you will hear directly from John Kindervag about how the Zero Trust model was initially created, how it has evolved over the years, how it can actually be implemented into a realistic, enterprise security framework, and a host of examples of why Zero Trust may be an ideal security posture for your Org. John's responses touch on both the technical development and operations side, serving as a valuable resource for a variety of IT professionals and software hobbyists.

A full list of what's discussed in the interview:

  • Cybersecurity landscape before Zero Trust
  • Concept of "trust" in Zero Trust model
  • Zero Trust - technical POV
  • Zero trust and the Principle of Least Privilege
  • Implementing Zero Trust
  • Defense in Depth vs Zero Trust
  • Zero Trust streamlines cybersecurity
  • AWS S3 Gateway vulnerability example
  • Application vs Infrastructure security
  • Securing Apps under Zero Trust
  • Achieving Zero Trust

If you want to listen to more episodes of Radio Cloud Native, please visit https://www.mirantis.com/radiocloudnative/ to download, or find them wherever you prefer to consume your podcasts.

If you are interested in contributing to Radio Cloud Native, please reach out to our podcast team: [email protected]

  continue reading

فصول

1. Intro (00:00:00)

2. Q: Before Zero Trust, what were the dominate models for cybersecurity? (00:01:31)

3. Q: Why is the concept of "trust" problematic in cybersecurity? (00:02:48)

4. Q: How does Zero Trust work from a technical perspective? (00:09:11)

5. Q: How does this relate to the principle of least privilege? (00:11:49)

6. Q: How do you implement Zero Trust in the real world? (00:13:11)

7. Q: How is Defense in Depth different from Zero Trust? (00:15:55)

8. Q: How does Zero Trust simplify & enhance the cybersecurity process? (00:20:18)

9. Real World Example: AWS S3 Gateway Attacked (00:22:49)

10. Application vs Infrastructure security under Zero Trust (00:25:00)

11. Q: Who is responsible for securing Apps under Zero Trust? (00:26:18)

12. Zero Trust is achievable (00:29:29)

13. Outro (00:31:49)

69 حلقات

Artwork
iconمشاركة
 
Manage episode 475482353 series 3342345
المحتوى المقدم من Mirantis Inc.. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Mirantis Inc. أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In this episode of Radio Cloud Native, former host John Jainschigg, Director of Open Source Initiatives for Mirantis, returns to provide a great interview with one of the founders of the Zero Trust model for cybersecurity, John Kindervag. He has authored many blog articles and much of the open source documentation of Zero Trust, and is one of the most knowledgeable cybersecurity experts in the cloud space.

In the interview, you will hear directly from John Kindervag about how the Zero Trust model was initially created, how it has evolved over the years, how it can actually be implemented into a realistic, enterprise security framework, and a host of examples of why Zero Trust may be an ideal security posture for your Org. John's responses touch on both the technical development and operations side, serving as a valuable resource for a variety of IT professionals and software hobbyists.

A full list of what's discussed in the interview:

  • Cybersecurity landscape before Zero Trust
  • Concept of "trust" in Zero Trust model
  • Zero Trust - technical POV
  • Zero trust and the Principle of Least Privilege
  • Implementing Zero Trust
  • Defense in Depth vs Zero Trust
  • Zero Trust streamlines cybersecurity
  • AWS S3 Gateway vulnerability example
  • Application vs Infrastructure security
  • Securing Apps under Zero Trust
  • Achieving Zero Trust

If you want to listen to more episodes of Radio Cloud Native, please visit https://www.mirantis.com/radiocloudnative/ to download, or find them wherever you prefer to consume your podcasts.

If you are interested in contributing to Radio Cloud Native, please reach out to our podcast team: [email protected]

  continue reading

فصول

1. Intro (00:00:00)

2. Q: Before Zero Trust, what were the dominate models for cybersecurity? (00:01:31)

3. Q: Why is the concept of "trust" problematic in cybersecurity? (00:02:48)

4. Q: How does Zero Trust work from a technical perspective? (00:09:11)

5. Q: How does this relate to the principle of least privilege? (00:11:49)

6. Q: How do you implement Zero Trust in the real world? (00:13:11)

7. Q: How is Defense in Depth different from Zero Trust? (00:15:55)

8. Q: How does Zero Trust simplify & enhance the cybersecurity process? (00:20:18)

9. Real World Example: AWS S3 Gateway Attacked (00:22:49)

10. Application vs Infrastructure security under Zero Trust (00:25:00)

11. Q: Who is responsible for securing Apps under Zero Trust? (00:26:18)

12. Zero Trust is achievable (00:29:29)

13. Outro (00:31:49)

69 حلقات

All episodes

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل