As organizations rapidly adopt Large Language Models (LLMs) across business functions, cyber risk auditors and security professionals face an urgent need to secure these systems end-to-end. This 8-hour workshop bridges the gap between governance and technical implementation, guiding you through a practical, structured approach to building and assessing cybersecurity.
Zero Trust Architecture is a concept much talked about but not widely understood or implemented. Still, it is the future of Information Security, and IT Auditors and Information Security professionals need to gain an understanding of Zero Trust’s concepts, commercial availability and implementation directions. This event presents the strengths and impediments of implementing Zero Trust and what needs to be done to achieve the objectives of this architecture.
Agenda at a Glance
Session 1: 9:00 AM to 10:30 AM EST
A. Information Security architecture
- History
- Purpose
- Impediments
- Why we failed
B. Zero Trust Architecture
- History
- Key concepts
- Critical components
Break: 10:30 AM to 10:45 AM EST
Session 2: 10:45 AM to 12:00 PM EST
C. Impediments to implementation
- Mapping to business needs
- Insecure identity
- Over-authorization
- Weak data management
- Incomplete knowledge of applications
D. Zero Trust eXtended (ZTX) Ecosystem
- Concepts
- Reference architecture
- Extended timeframe
- Overview of key components
- Case study #1
Lunch Break: 12:00 PM to 12:45 PM EST
Session 3: 12:45 PM to 3:00 PM EST
E. ZTX Product Categories
1. Components of a Zero Trust Ecosystem
2. Platform
3. Security Automation and Orchestration
4. Visibility and Analytics
5. People
i. Interaction
ii. Identity
6. Workload
7. Data Security
8. Network Segmentation
9. Devices
10, Case Study #2
F. The Zero Trust implementation process
- Roadmap
- Strategy
- Development of a reference architecture
- Administrative infrastructure
- Product acquisition
- Product retirement and replacement
Break: 3:00 PM to 3:15 PM EST
Session 4: 3:00 PM to 4:45 PM EST
G. Products supporting Zero Trust
- Zero Trust Platform
- Security automation and orchestration
- Security visibility and analytics
- People
i. Interaction
ii. Identity
- Workload security
- Data security
- Network segmentation
- Device security
- Case study #3
H, Acquisition considerations
- Single or multiple vendors
- Products or services
- On-premises, in the cloud or hybrid
Session 5: 4:45 PM to 5:00 PM EST
15 mins: Conclusions Q&A