Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and techniques over and over again. In this presentation, we will briefly examine two top models and then explore what that means on a practical level. We will broadly look at some traditional network visibility solutions and challenge some of the norms around these systems. Do they really solve the problem in the best way in a world where everything is encrypted and threat actors hide in plain sight?
Key takeaways:
- Can classic tools such as logging really solve for the visibility gap?
- How to deal with the encryption/decryption paradox?
- What method can solve for lateral visibility?