У нас вы можете посмотреть бесплатно Episode 39: ZTMM+ How to Assess and Roadmap Zero Trust или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
00:00 Introduction to Zero Trust Journey 01:06 Understanding Zero Trust Maturity Models 02:47 Evolution of ZTMM+ and Future Plans 04:25 Challenges in Achieving Zero Trust Maturity 06:22 Prioritizing Zero Trust Implementation 09:41 Fictitious Company Assessment: Precision Dynamic Manufacturing 12:00 Exploring Identity Pillar Functions 17:01 Network Segmentation and Governance 20:10 Maintaining Access Policies 22:31 Cloud and SaaS Considerations in Zero Trust 23:16 Integrating SaaS Platforms for Enhanced Security 25:48 Starting the Zero Trust Journey 28:28 Progressing Through Authentication Levels 31:17 Understanding Identity Functions 33:10 Network Segmentation and Access Control 36:59 Building Trust Through Zero Trust Strategies "Zero Trust is not a journey where you have to spend a lot of money upfront before you can get started. In almost every case, you just need to use what you have better." In this workshop-style episode of the Zero Trust Journey, Dr. Victor Monga sits down with Jason Garbis and Jerry Chapman from Numberline Security. They move beyond the theory to conduct a live Zero Trust assessment of a fictitious company, "Precision Dynamic Manufacturing" (PDM). From "sticky note" admin passwords to flat networks where CNC machines and Wi-Fi guests coexist, Jason and Jerry map out a practical, no-fluff roadmap to maturity. ▶ IN THIS EPISODE, WE COVER: ▶ The ZTMM+ Framework: Why the standard CISA model needed an upgrade and how "Governance" acts as the critical glue across all five security pillars. ▶ The PDM Case Study: A deep dive into an SMB with 200 employees—evaluating the risks of an IT stack built by the "neighbor's kid" and how to secure it before a CMMC audit. ▶ MFA is Non-Negotiable: Jerry breaks down the journey from simple SMS codes to phishing-resistant authentication and why it’s the single most important move for identity. ▶ Stop Buying, Start Configuring: How to leverage your existing Microsoft Entra ID (Azure AD) stack to achieve Zero Trust principles without a massive capital investment. ▶ Network Segmentation for OT: Practical strategies for isolating "crusty" legacy hardware and CNC machines from the rest of the enterprise to stop lateral movement. ▶ Building External Trust: How a mature Zero Trust posture directly impacts your ability to secure cyber insurance and win contracts with security-conscious partners. Connect with the Guests: Jason Garbis: / jasongarbis Jerry Chapman: / jerrychapman Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges: / zero-trust-journey 👉 Learn more at: ztjourney.com Disclaimer: The views and opinions expressed in this episode are those of the speakers and do not necessarily reflect the official policy or position of any affiliated organization. This content is provided for informational purposes only.