You are on page 1of 6

Agenda

•Cyber Security

1
“We have all been hacked, the only question is whether you know it or
you don’t”
2
Cyber Security Incidents

3
Cyber Attack Surface

4
Cyber Attack Incident Response

5
Key Trends in Industry – Containment strategies

Tradition Security model - secure networks from the inside and assumes trust within the network
perimeter to provide broad access to resources

Zero Trust Network Access model (ZTNA) - follows a “never trust, always verify” approach,
6

You might also like