У нас вы можете посмотреть бесплатно Episode 40: Over-provisioning access is a common issue или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
00:00 Introduction to Zero Trust and Guest Background 02:35 The Evolution of Trust in Cybersecurity 05:29 Understanding Zero Trust as a Mindset 08:00 Complex Systems and Zero Trust Principles 11:07 Risk Management and Cybersecurity Strategy 13:53 The Role of Identity in Zero Trust 16:43 Preparing for Cybersecurity Incidents 19:35 The Future of Cybersecurity and Zero Trust 22:27 Reflections on the Past and Future of Cybersecurity In this episode of the Zero Trust Journey, Dr. Victor Monga sits down with Jamie Fitz-Gerald, VP of Product Management at Okta. We dive deep into why identity has become the new perimeter and why the biggest risk to your organization isn't just a lack of tools—it's the effectiveness of the ones you already have. What You’ll Learn: ◈ The Identity Perimeter: Why attackers have stopped "breaking in" and started "logging in." ◈ System Resilience: Lessons from electrical engineering on surviving 1, 2, and 3-point failures. ◈ Productivity vs. Security: How to balance the "padlock on the door" with a seamless user experience. ◈ The Effectiveness Gap: Why having the best tools doesn't mean you're secure if you aren't testing them. Key Moments: 02:34 ➔ The "Padlock" Era: Security lessons from the defense industry. 04:36 ➔ Why you can't "buy" Zero Trust. 10:19 ➔ Designing for failure: The 1, 2, and 3-point failure rule. 15:45 ➔ The Importance of Asset Inventory (The basics still matter!). 21:46 ➔ THE QUOTE: "Attackers are not breaking in, they're logging in." 🎙️ Meet the Guest: Jamie Fitz-Gerald is the VP of Product Management at Okta, focusing on access management and device security. With a career spanning Palo Alto Networks, Raytheon, and Lockheed Martin, Jamie brings a unique "systems engineering" perspective to cybersecurity. ➔ LinkedIn: / jamiefitzgerald About ZTJourney: Host: Dr. Victor Monga ( / victorvirtual ) Subscribe to our LinkedIn for news, updates, and quizzes to earn digital badges: 👉 / zero-trust-journey 👉 Learn more at: ztjourney.com