Learn about mathematical modeling of zero trust and confidential computing

Logo
Presented by

Yeghisabet Alaverdyan, Head of Systems Integration | EKENG CJSC

About this talk

Computer networks and infrastructures are constantly subject to cyber-attacks, so organizations must continuously strengthen the cyber defense of their assets. In this context, adopting zero trust along the appropriate approaches are the only acceptable solutions to achieve perimeterless information security and data privacy. The concept of zero trust is based on the following factors: - Strict identity verification for external and internal users or devices trying to access a resource, without exception. - Multifactor authentication. - Authorization. - Ensuring the physical/logical integrity of digital assets and data. Having the Cyber-Resilience Act in hand, plenty of compliant technological solutions are being introduced and implemented within tamper-proof devices and secure enclaves. The methodology behind these solutions is enforced and is being permanently developed by advances in secure and trusty computations. This webinar is devoted to a conceptual introduction to mathematical modeling of zero trust and confidential computing.
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (364)
Subscribers (65140)
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.