Certified Zero Trust Practitioner (CZTP) - Organized by Network Intelligence

Starts:  Jul 29, 2024 06:00 (SG)
Ends:  Jul 31, 2024 10:00 (SG)
Associated with  Manila Chapter

What is Zero Trust?

▪ Zero Trust is a security framework that mandates the authentication, authorization, and   continuous validation of all users—whether inside or outside the organization’s network—   before granting or maintaining access to applications and data..

▪ In Zero Trust training, trust is not automatically granted based on a user's location or the       network they're accessing. Instead, access to resources is granted based on strict verification   of identity, device security posture, and other contextual factors. Key components of Zero   Trust Architecture include:

• Identity verification, device security posture assessment, least privilege access, micro-     segmentation, and continuous monitoring.

Why is Zero Trust model Needed?

▪ The modern workforce is becoming increasingly mobile, accessing applications and cloud services from multiple devices outside of the business perimeter. In the past, many enterprises adopted a “verify, then trust” model — which meant if someone had the correct user credentials, they were admitted to whichever site, app, or device they were requesting. This resulted in an increased risk of exposure, dissolving what was once the trusted enterprise zone of control and leaving many organizations exposed to data breaches, malware, and ransomware attacks. Protection is now needed within specific digital infrastructures where applications and data, and users and devices, are located.

Who can attend:

▪ IT and Network Security Professionals
▪ System Administrators
▪ Security Architects
▪ Compliance and Risk Management
   Professionals
▪ IT Managers and Executives
▪ Consultants and Service Providers

Objectives:

▪ Minimize Trust Assumptions: ZTA verifies every user, device,
  and application accessing network resources, reducing
  reliance on assumed trust based on location or identity.
▪ Strengthen Access Control: Implement granular access
  controls, granting users and devices only the necessary access
  based on the principle of least privilege.
▪ Enhance Security Posture: Improve overall security by
  reducing the attack surface and proactively preventing,
  detecting, and responding to threats.
▪ Enable Secure Remote Access: Facilitate secure access to
  organizational resources for remote workers and cloud-based
  services without compromising security.

Course Fee:

USD 249 (Regular participant)

USD 219 (ISACA/ISC2 members)

Location

Dial-in Instructions:
Event Image