У нас вы можете посмотреть бесплатно Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm. Show notes: GME - www.gme.net.au Owl Cyber Defense - www.owlcyberdefense.com Modern Defense Architecture (Australia) - https://www.cyber.gov.au/business-gov... Chris Rule - / christopher-rule-fieaust-cpeng-gaicd-05600b30 Michael Blake - / michael-blake-734b0a21