<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4393876&amp;fmt=gif">
BTA_Logo_Transparent_SM

Zero Trust Strategy Workshop 

The Workshop addresses the following:

  • Defining Zero Trust
    • Business requirements
    • Technical requirements
    • Segmentation strategy
    • Current security architecture
      • Trust boundaries
      • Authentication
      • Visibility
    • Risk Profile Discussion
Untitled design-2
Untitled-design-21

 
  • Zero Trust Considerations
    • Review best practices
    • Review examples
    • Segmentation policy deployment
      • Definition, analysis, and enforcement
    • Change management
    • CVE reporting
    • Management reporting
 
  • Identify Critical Use Cases
    • Ransomware prevention
    • Workload and OS
    • Virtual desktops (VDI)
    • Endpoint strategy
    • IoT
 

1619765269125

at-a-glance-c45-737367_1
  • BTA Read-out and Recommendations
    • ROI considerations
    • Tool and solution options
    • Managed services

Schedule a Conversation