← All talks

Adopt Or Risk: Why Zero Trust Is Key To Modern Cyber Defence

BSides London · 202512:5271 viewsPublished 2025-02Watch on YouTube ↗
Speakers
Tags
CategoryTechnical
StyleTalk
About this talk
Zero Trust is a security approach that eliminates implicit trust and enforces continuous verification of users, devices, and data access regardless of network location. The talk covers key concepts including least privilege access, multi-factor authentication, and real-time monitoring, alongside practical implementation strategies for individuals and organizations. Through case studies, the speaker demonstrates how Zero Trust adoption reduces attack surfaces, strengthens security posture, and addresses modern threats including lateral movement and compliance risks.
Show original YouTube description
This presentation will explain how the Zero Trust approach eliminates implicit trust, enforcing continuous verification of users, devices, and data access, regardless of whether they are inside or outside the network. It will cover key concepts such as least privilege access, multi-factor authentication, and real-time monitoring to reduce the risk of breaches, social engineering attacks, and compromised credentials. Attendees will gain insights into the practical steps required to implement a Zero Trust architecture, including integrating it with existing infrastructure and overcoming challenges. Through case studies and real-world examples, the talk will demonstrate how businesses that have adopted Zero Trust have enhanced their security posture, reduced attack surfaces, and gained greater control over their digital environments. This session is designed to equip cybersecurity professionals, IT leaders, and decision-makers with the knowledge needed to understand the urgency of Zero Trust adoption. The takeaway is clear: adopting Zero Trust is no longer optional—it’s essential for protecting organisational data, maintaining business continuity, and staying ahead of modern cyber threats.
Show transcript [en]

y zero trust is key to Modern cyber defense my name is malicious um what we cover today uh will be what is zero trust benefits of adopting zero trust and risk of not adopting zero trust we also be looking at zero trust for everyone implementation for individuals and gations and lastly we take questions and answers what is zero trust Zer trust is a cyber security approach that does not automatically um allow any sort of verification or assets by protecting organizations infrastructure and assets and what this does is that for every request or access to your environment it is important that those assets are verified to avoid any compromise in your environment by any B actor or

unauthorized users we'll be going straight to the benefits of adopting zero trust there are lot of benefits to adopting zero trust and what that can do for your organization it can help in improving your security posture and making sure that users data or access are not compromised now um The Next Step I will be going to is a key uh things we can you know get in from adopting Z so I'll be exploring some few options and then I'll be explaining that along the way reduce attack surface so what this means is that you only need all the right Assets in order to make sure that users in environment or organizations are not compromised and um by giving users the

right access they need this Mak it more harder for Bad actors or unauthorized access within your environment by therefore securing environment with a better security posture the next one I will be talking about is strong authentication and authorization so it is very that you make sure you your organization is being secured by implementing authentication methods using M authentication to start assess complex assess controls and this would also help making sure that all assets coming within your environment are verified before they can be granted any permission or [Music] request the next on the list is support for remote and hybrid work I'm very sure that few years ago what happened during the co where organizations had to transition into

remote and this was possible because of zero trust Solutions and um I mean we could see how organizations were able to transition successfully by adopting to zero trust using Solutions like conditional assess whereby if your device is taken in or us just are trying to sign in with a different location so their Environ their assets are getting validated and by so doing if you if you do not meet those requirement that has been set up by your organization you can you can find out that those requests mostly get denied and what this does in the long term is to protect you from you know getting compromised or users losing data or any set of Cyber

attack and the next one will be about is the risk of not adopting to zero trust when you do not adopt to zero trust this keeps your organization or your information vulnerable and makes it easier for attackers to get in and steal your datas especially the ones that are very important and thereby caum more harm within your environment so it is imperative that Zer trust is actually adopted um I'll be talking about cyber attacks so if your environment is not secured it gives room for cyber attackers to Ste import data and thereby causing more problem or harm for your environment or your organization next is Leal movement so with Leal movement so this is a process

whereby an attacker gets access within your environment and also at the same time explore more options by taking advant anage of vulnerable um data or database to get more access to other critical data or sensitive information and thereby compromising your environment more and then still a more important information and lastly is non-compliance risk it is very important that compliance are being maintained and this is this comes in light on in regulation like the gdpr or H or hyper where which requires strong access controls and organizations that fails to you know maintain the standard would obviously find them themselves in the position of paying Hefty fines the if by means they um if they if by means they they misuse

or they misuse personal information by processing them or they lose um you know individual data they might find themselves you know paying Healy fines and so it is important that you make sure that all stronger access controls are being implemented to avoid such um situation from [Music] happening zero trust for everyone so it is important to understand that this cyber security strategy is not only for organizations but it's also for small medium organizations and also individuals so everyone is entitled to um adopt to this solution I'll be speaking on U few things that we can use to make sure that our environments are protected either as an individual or as as us or as an

[Music] organization zero trust for zero trust implementation for individuals so one we have mul authentication this is quite I believe most of us might have interacted using M authentication when you want to have maybe access our emails or may you want to log in to maybe our bank so we we most of the time interact where we get calls phone either calls or phone calls on our phon so and this is what this is and this is what M multif authentication is doing here and this is one of and this is the cyber security strategy to protect us to make sure that we have that right access to our environment and we are the genuine

owners to whatever we are trying to request access to the next is device restriction this one is more um very obvious when we are using our phones for instance let's say you want to open an application and then you get uh a request to allow access to either your camera or to some of applications I think it is very important that before we Grant any access we must make sure that whatever we are going access to will not compromise our mobile phones or will not compromise our data sorry and um and the reason for this is because of the zero trust approach and which you know go forward in protecting us from losing assets losing our informations to any

Bad actors or any person that might trying to H Us by sing our information from our devices lastly is the updates updating software so it is important that you make sure that your softwares on your phone or applications are updated and there there are a lot of benefits that comes with updating your software and when you do this you find yourself in being in a better you know security posture uh getting getting um getting rid of you know vulnerabilities from your devices your applications and you know maintaining a very good SEC so it's very imperative that we measure that our softwares are regly updated sross implementation for organizations there are lot there are lot of um security strategy that org can

use to protect the environment from getting compromised but we'll be talking about few options here and one in our list is multiple authentication so here we can use multiple authentication model we can use um the like for in Microsoft authenticator method or C do app authentication method we can also use mobile or phone so depending on what organizations need so it's very imperative to measure that these uh methods are being implemented and users are using them as designed the next is identity and asset management so what this does is to make sure that us just do not have you know more than the required more the required and this prevent us from you know Finding ourself

in a situation of being compromised either in our accounts or or data leak or anything and there is a popular um solution I always recommend which is just in time so what it just in time does is it makes sure that your policy you have set up works exactly um on the user you have set it up and it how it works is if for instance you want a users um to stop you know having access to application or or to a source so you set up a policy to say um I want by the 10th of December let this um assets get terminated or delete this account or remove this person from this so this is

what Justin time does so it is very important that organizations you know adopt this this um Asset Management strategy and the and the last one is device compliance and continuous monitoring so it is very important that you set up policies to you know protect your devices there are a couple of you know Solutions like Microsoft in tune that you can use to set up your policy for device compliance making sure making sure that the policy you have set up are you know are standard and and in a scenario whereby those devices do not miss those policies that are being um set up so the security the authentication set up behind it will take effect and thereby you know Pro

getting your devices from getting you know compromised or getting um accessed to by unauthorized users or but actor so it is very important that we set up our device to meet you know the compliance set of acusations and the last is continuous monitoring so this helps us to you know detect um unauthorized logins or suspicious logins or activities and so it's very important that we use our logins monitoring and we use also auditing to check what is happening in the environment and to conclude so it is very important that as an individual or as an organization zero trust is the key to protecting your environment and by adopting to these strategies you prevent yourself from getting compromised or

getting your datas you know getting leaked or but rather by either further by then you know giving um your s and the organization a gr security posture and then getting protected from any start ofs any question thank you any [Music] questions thank you