
we know perimeter security is dead - how to get over it and where to? (mrmcd24)
Chaos Computer Club - archive feed · mc.fly
October 5, 202451m 34s
Audio is streamed directly from the publisher (cdn.media.ccc.de) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
We're still training perimeter security as one of the main mantras of information security in companies.
I show what perimeter security is and why it is outdated. I will give an alternative to replace permieter security with a zero trust approach and how to implement that in a company network.
This is a talk over a needed change in network architecture as the older approach called perimeter security is not only not effective anymore but actually dangerous for companies.
I will explain why the perimeter security approach is dangerous and why we need to stop doing it.
I'll describe on what to do instead - and how to get there, even in a compliancy heavy company enviroment.
https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://talks.mrmcd.net/2024/talk/8CZJFN/
Topics
401Darmstadtmrmcd24mrmcd24C120 - Rainbow Warrior2024Day 3