"No Trust" by Zero Trust Forum

By: "No Trust" by Zero Trust Forum
  • Summary

  • Listen to experts discuss the latest in Zero Trust security on our podcast! Explore topics like adaptive access control, data protection, and insider threat mitigation. Stay informed about Zero Trust architecture, best practices, and real-world case studies to enhance your cybersecurity strategy. Tune in for insights and advice on building a resilient, secure infrastructure.
    All rights reserved
    Show more Show less
Episodes
  • From Theory to Practice: The Zero Trust Journey - Episode 2, with John Kindervag and Dr Chase Cunningham
    Apr 17 2025
    From Theory to Practice: The Zero Trust Journey - Episode 2, with John Kindervag and Dr Chase Cunningham by "No Trust" by Zero Trust Forum
    Show more Show less
    44 mins
  • Surviving the Ransomware Threat with Art Ocain
    Apr 1 2025
    In this conversation, Art Ocain discusses the current landscape of cybersecurity threats with the No Trust crew, particularly focusing on ransomware attacks. They explore how attackers gain access to systems, the importance of multi-factor authentication, and the vulnerabilities of small and medium-sized businesses. The conversation delves into immediate actions organizations should take during a ransomware attack, the balance between recovery and forensic investigation, and the critical role of communication during incidents. They also address the ethical dilemma of paying ransoms and share lessons learned from past incidents, emphasizing the need for ongoing security improvements and preparedness for future threats. Takeaways • VPN is currently the main vector for attacks • Small and medium businesses are often less prepared for attacks • Many companies still lack MFA on their VPNs • Organizations often believe they are immune to attacks until it's too late • Hypervisors are a primary target for ransomware attacks • Minimizing the attack surface is crucial for security • Isolating from the internet is a key first step during an attack • The decision to pay ransom is complex and often driven by immediate business needs • A full forensic investigation is essential after an attack • Ransomware trends continue to evolve and are not declining Follow & Subscribe on all Podcast platforms. link.chtbl.com/XIW5zsAn What is the Zero Trust Forum about? It’s about empowering zero trust security professionals with strategies, architecture, and real world journeys to secure the digital future, the right way! Follow the Zero Trust Forum on LinkedIn www.linkedin.com/company/zero-trust-forum/. Follow Jaye Tillson on LinkedIn - www.linkedin.com/in/jaye-tillson/ Follow John Spiegel on LinkedIn - www.linkedin.com/in/john-spiegel-2011543/ Takeaways • Identity is the heart of zero trust. • Most breaches occur due to weak passwords. • Identity is the key to the perimeter. • Assuming trust can lead to vulnerabilities. • Zero trust is a continuous journey. • Organizations need visibility into their identity landscape. • AI can assist in analyzing identity-related data. • Non-human identities are a growing concern. • MFA is essential but not the only solution. • The future of identity management will involve AI. Follow & Subscribe on all Podcast platforms. link.chtbl.com/XIW5zsAn What is the Zero Trust Forum about? It’s about empowering zero trust security professionals with strategies, architecture, and real world journeys to secure the digital future, the right way! Follow the Zero Trust Forum on LinkedIn www.linkedin.com/company/zero-trust-forum/. Follow Jaye Tillson on LinkedIn - www.linkedin.com/in/jaye-tillson/ Follow John Spiegel on LinkedIn - www.linkedin.com/in/john-spiegel-2011543/
    Show more Show less
    46 mins
  • Identity in the Age of Zero Trust with David Morimanno
    Mar 10 2025
    In this conversation, David Morimanno and the No Trust crew delve into the critical role of identity in the context of zero trust security. They discuss how identity serves as the new perimeter, the importance of multi-factor authentication, and the challenges organizations face in implementing effective identity management strategies. The conversation also touches on the significance of non-human identities, the potential of AI in enhancing security measures, and the future trends in identity and cybersecurity. Takeaways • Identity is the heart of zero trust. • Most breaches occur due to weak passwords. • Identity is the key to the perimeter. • Assuming trust can lead to vulnerabilities. • Zero trust is a continuous journey. • Organizations need visibility into their identity landscape. • AI can assist in analyzing identity-related data. • Non-human identities are a growing concern. • MFA is essential but not the only solution. • The future of identity management will involve AI. Follow & Subscribe on all Podcast platforms. link.chtbl.com/XIW5zsAn What is the Zero Trust Forum about? It’s about empowering zero trust security professionals with strategies, architecture, and real world journeys to secure the digital future, the right way! Follow the Zero Trust Forum on LinkedIn www.linkedin.com/company/zero-trust-forum/. Follow Jaye Tillson on LinkedIn - www.linkedin.com/in/jaye-tillson/ Follow John Spiegel on LinkedIn - www.linkedin.com/in/john-spiegel-2011543/
    Show more Show less
    47 mins
adbl_web_global_use_to_activate_webcro768_stickypopup

What listeners say about "No Trust" by Zero Trust Forum

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.