18 min

Ssn 2 Ep 13: Zero Trust Pt 1 The Cyber Savvy Cafe

    • Technology

Ssn 2 Ep 12: Zero Trust
Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a way of structuring your network so you can do just that.
 
 
Show Notes:
:42: An overview of Zero Trust
 
1:25: What is Zero Trust Network Architecture?
 
2:15: Make sure you know who is accessing your data and how and when
 
2:42: What is the normal way companies have their network structured? A look at flat networks
 
3:13: Bare minimum—segment your network
 
3:37: On premise servers vs. the cloud
 
4:13: Flat network example using email in a cloud environment—how is your data accessed and how easy is it to break in?
 
5:03: How a malicious actor can move easily around your flat network
 
6:07: Phishing attacks and other ways threat actors can invade your network, and how an individual might be targeted and attacked
 
7:15: Entry points: smart devices and other devices that are on your network—that may be infected with malware—and other entry points
 
8:37: What would a Zero Trust environment look like?
 
12:55: What happens if you don’t implement this? You’re going to get hacked and held for ransom. It’s not about if but when.
 
14:00: Is it enough to just segment your network?
 
14:39: But all this time I’ve never been compromised so what I’ve been doing must be good enough.
 
15:25: Hacking is big business-- probably reaching the trillions. Hackers are looking for the easiest targets.
 
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
 
 
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
 
Voiceover Artist: Paul Kadach at www.voices.com

Ssn 2 Ep 12: Zero Trust
Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a way of structuring your network so you can do just that.
 
 
Show Notes:
:42: An overview of Zero Trust
 
1:25: What is Zero Trust Network Architecture?
 
2:15: Make sure you know who is accessing your data and how and when
 
2:42: What is the normal way companies have their network structured? A look at flat networks
 
3:13: Bare minimum—segment your network
 
3:37: On premise servers vs. the cloud
 
4:13: Flat network example using email in a cloud environment—how is your data accessed and how easy is it to break in?
 
5:03: How a malicious actor can move easily around your flat network
 
6:07: Phishing attacks and other ways threat actors can invade your network, and how an individual might be targeted and attacked
 
7:15: Entry points: smart devices and other devices that are on your network—that may be infected with malware—and other entry points
 
8:37: What would a Zero Trust environment look like?
 
12:55: What happens if you don’t implement this? You’re going to get hacked and held for ransom. It’s not about if but when.
 
14:00: Is it enough to just segment your network?
 
14:39: But all this time I’ve never been compromised so what I’ve been doing must be good enough.
 
15:25: Hacking is big business-- probably reaching the trillions. Hackers are looking for the easiest targets.
 
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
 
 
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
 
Voiceover Artist: Paul Kadach at www.voices.com

18 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
Lex Fridman Podcast
Lex Fridman
TED Radio Hour
NPR
Darknet Diaries
Jack Rhysider