Steps to Introduce Zero Trust Architecture
After learning about all of the benefits of Zero Trust Architecture, this video walks you through the steps to implement it from Assessment to Deployment
Logical Components of Zero Trust Architecture
This short video provides an overview of the Logical Components found in Zero Trust Architecture including the control plane, data plane, CDM system, threat intelligence,
Zero Trust Lingo
This brief video introduces some of the language and concepts surrounding Zero Trust including Policy Engine (PE), Policy Administrator (PA), Policy Enforcement Point (PEP), Continuous
Tenets of Zero Trust
Learn about the Seven Tenets of Zero Trust in this video: All data sources and computing services are considered resources. All communication is secured regardless
Enterprise with RA Zero Trust Use Case
In this short video, Eric Smith walks through the common scenario of Enterprise with Remote Access. This video is a small portion of the Zero-Trust:
Enterprise with Nonemployee Access Zero Trust Use Case
In this short video, Eric Smith walks through the common scenario of Enterprise with Nonemployee Access. This video is a small portion of the Zero-Trust:
Multi-Cloud Scenario Zero Trust User Case
In this short video, Eric Smith walks through deploying Zero Trust Architecture in a Multi-Cloud Access scenario. This video is a small portion of the
Threats Against Zero Trust
This video outlines the various threats that surround Zero Trust including: Subversion of the ZTA decision process Denial of Service (DoS) or Network Disruption Stolen
Variations of Zero Trust Architecture
In this video, learn about different variations of Zero Trust architecture including Pure ZTA and Hybrid ZTA. This video is a small portion of the
Grow Your Network programmability Skills with Cisco DevNet
In this 30-minute Tech Session, Edwin Owen teaches you how to advance your network programmability skills using the Cisco DevNet site. Learn: Where to find
Learn To Accelerate Your Cloud-Based Configuration With Terraform
These slides were used to present the Learn To Accelerate Your Cloud-Based Configuration With Terraform Tech Session. (Click below to view/download these slides)
Learn To Accelerate Your Cloud-Based Configuration With Terraform
This 40-minute Tech Session, presented by Edwin Owen, is a beginner level webinar that will teach you the basics of Terraform, and how to use
What Is New with Snort V3.0
In this 40 minute session, Eric Smith covers Snort v3.0, including: A brief history of Snort New features of Snort v3.0 How to migrate your
What Is New with Snort V3.0
These slides were used to present the What Is New with Snort V3.0 Tech Session. (Click below to view/download these slides)
A Cloud Security Workshop – Zero Trust Architecture and Beyond
Remote and roaming users, cloud-based apps, and insecure networks are all leaving the door open to attacks like phishing, ransomware, and malware. With more users,