Professional Documents
Culture Documents
•Cyber Security
1
“We have all been hacked, the only question is whether you know it or
you don’t”
2
Cyber Security Incidents
3
Cyber Attack Surface
4
Cyber Attack Incident Response
5
Key Trends in Industry – Containment strategies
Tradition Security model - secure networks from the inside and assumes trust within the network
perimeter to provide broad access to resources
Zero Trust Network Access model (ZTNA) - follows a “never trust, always verify” approach,
6