Zero Trust Strategy Workshop
The Workshop addresses the following:
Defining Zero Trust
Business requirements
Technical requirements
Segmentation strategy
Current security architecture
Trust boundaries
Authentication
Visibility
Risk Profile Discussion
Zero Trust Considerations
Review best practices
Review examples
Segmentation policy deployment
Definition, analysis, and enforcement
Change management
CVE reporting
Management reporting
Identify Critical Use Cases
Ransomware prevention
Workload and OS
Virtual desktops (VDI)
Endpoint strategy
IoT
BTA Read-out and Recommendations
ROI considerations
Tool and solution options
Managed services
Schedule a Conversation