Learning Center Home > Data Security > Zero Trust Tenets

Zero Trust Tenets

Data Security

Having issues accessing the video above? Watch the video here.

SecurityMetrics Podcast | 37

Zero Trust Tenets

"Zero Trust is essentially a security initiative saying that you are going to assume that attackers are present in any environment you're working in. The main goal of that is to remove implicit trust in the design and implementation of whatever you're doing."

“Zero trust” is something we hear a lot about but in many cases it seems to be a buzzword used to sell us something. However, it can be an excellent approach to security when done well. Tune in this week as Jen Stone (MCIS, CISSP, CISA, QSA) speaks with Geoffrey Sanders (Senior Member of the Technical Staff/Situational Awareness Team, Software Engineering Institute/CERT Division, Carnegie Mellon University) about the tenets of zero trust and where to get started in implementing zero trust in your environment.

Listen to learn:

  • How privacy and security are related
  • Where to start when you need to understand how laws and regulations apply to you
  • What direction policy and legislation are taking to address cybercrime

Connect with our guest on LinkedIn

Learn more: SEI Website

Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment Blog

Zero Trust Adoption: Benefits, Applications, and Resources Podcast

SecurityMetrics Podcast: The latest in data security and compliance


Download our Guide to PCI Compliance! -  https://www.securitymetrics.com/lp/pci/pci-guide

Download our Guide to HIPAA Compliance! -  https://info.securitymetrics.com/hipaa-guide

Attend our free cybersecurity and compliance conference - www.securitymetrics.com/summit

This podcast is available on all your favorite podcast platforms, such as:

[Disclaimer] Before implementing any policies or procedures you hear about on this or any other episodes, make sure to talk to your legal department, IT department, and any other department assisting with your data security and compliance efforts.