PLAY PODCASTS
we know perimeter security is dead - how to get over it and where to? (mrmcd24)

we know perimeter security is dead - how to get over it and where to? (mrmcd24)

Chaos Computer Club - archive feed · mc.fly

October 5, 202451m 34s

Audio is streamed directly from the publisher (cdn.media.ccc.de) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

We're still training perimeter security as one of the main mantras of information security in companies. I show what perimeter security is and why it is outdated. I will give an alternative to replace permieter security with a zero trust approach and how to implement that in a company network. This is a talk over a needed change in network architecture as the older approach called perimeter security is not only not effective anymore but actually dangerous for companies. I will explain why the perimeter security approach is dangerous and why we need to stop doing it. I'll describe on what to do instead - and how to get there, even in a compliancy heavy company enviroment. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://talks.mrmcd.net/2024/talk/8CZJFN/

Topics

401Darmstadtmrmcd24mrmcd24C120 - Rainbow Warrior2024Day 3