
I'm here to talk about zero trust and talking about from a real world point of view how do people attack it? If you're a red teamer, you can take notes on that. And if you're a blue team you're defending it, you get to take notes cuz I'm going to talk about how do you prevent the attacks as well as how do you detect the attacks cuz you can never have 100% prevention. Um here's the quick agenda. And starting out with definition what is zero trust? And really what is zero trust depends on which marketing team you ask. Um the key here is the keyword in this definition it is an evolving set of paradigms. Um really because it is
all about marketing and who you ask. It's like AI. Um So but what is it really from a real practical point of view? Zero trust is when your workstations don't trust anybody around them and your accesses to your work resources are based on your identity. Um if you can take a user and hand them a Chromebook and sit them in bomb atmosphere to log on to Wi-Fi and they have the same level of protections as they do in the headquarters office, then you might be zero trust. And so that's kind of my ballpark explanation that I tell