Computer networks and infrastructures are constantly subject to cyber-attacks, so organizations must continuously strengthen the cyber defense of their assets. In this context, adopting zero trust along the appropriate approaches are the only acceptable solutions to achieve perimeterless information security and data privacy.
The concept of zero trust is based on the following factors:
- Strict identity verification for external and internal users or devices trying to access a resource, without exception.
- Multifactor authentication.
- Authorization.
- Ensuring the physical/logical integrity of digital assets and data.
Having the Cyber-Resilience Act in hand, plenty of compliant technological solutions are being introduced and implemented within tamper-proof devices and secure enclaves. The methodology behind these solutions is enforced and is being permanently developed by advances in secure and trusty computations.
This webinar is devoted to a conceptual introduction to mathematical modeling of zero trust and confidential computing.