Learn how a Zero Trust Architecture can strengthen the security structure of Critical Infrastructure systems. We’ll discuss how common best practices like role-based access controls, multi-factor authentication, and detailed audit trails will boost your Critical Infrastructure’s security posture.
Critical Infrastructure systems are increasingly becoming a prime target for cyber-attacks. NIST 800-53 provides a comprehensive framework for protecting these systems against various cyber threats. During this session, we will equip attendees with the knowledge and skills necessary to implement Zero Trust as a part of NIST 800-53 controls around authentication, authorisation, and access to safeguard critical infrastructure systems from potential cyber threats with a foundation in Zero Trust.
→ How Zero Trust helps Identify by eliminating shared-credentials and application-level credentials
→ How Zero Trust helps Protect by ensuring identity is part of authorisation systemically, including multi-factor authentication
→ How Zero Trust helps Detect by delivering fine-grained audit
→ How Zero Trust helps Respond
→ How Zero Trust helps Recover
Published by the National Institute of Standards and Technology (NIST), the guidelines in NIST 800-53 provide a framework for increasing the security of critical infrastructure resources. The standards help organizations identify and assess risks to their systems, implement appropriate security controls, and continuously monitor and improve their security posture.
Coupled with a Zero Trust Architecture, use the NIST 800-53 controls enables organizations to follow industry best practices for access. Through invoking least privilege access, authentication, fine-grained authorization, end-to-end encryption, and detailed audit trails, you ensure users are securely accessing your critical systems to perform their job.
Don Bowman, Founder and CEO, Agilicus
Founder and CEO of Agilicus, Don Bowman is an expert in cloud security, has worked as a national advisor, and recently completed a Zero Trust Network Access project with the Canadian Federal Government. Previously, Don was the CTO and Co-founder of Sandvine incorporated which was acquired in 2017.