2020 Virtual Cybersecurity & Fraud Summit: London , Events , Governance & Risk Management

Zero Trust, Compliance And the TLS Blind Spot

Zero Trust, Compliance And the TLS Blind Spot

Modern cyberattacks are not limited to network intrusions from outside by hackers. "Internal threat actors" can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.

The Zero Trust model, based on the simple principle of "trust nobody", defines rules which enhance the security of networks against modern cyberattacks, whether they are initiated from the outside or within. However, with most of the internet traffic being encrypted, it is becoming increasingly difficult to implement the Zero Trust model in an effective way.

The session will cover:

  • The role of "internal threat actors" and TLS encryption in modern cyberattacks
  • How the Zero Trust model defines the future of cybersecurity
  • Why effective decryption is essential for a fool proof Zero Trust strategy


Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.