Abstract
The concept of zero trust (ZT)—no trust by default and assume you are operating in a hostile environment—is not new, but applying this concept requires a paradigm shift in the way an organization protects its data and resources. ZT security frameworks typically require users and entities to be authenticated, authorized, and continuously validated before being granted access to applications, systems, and data. Eliminating implicit trust can significantly reduce the exposures from successful attacks. The U.S. Government has been spearheading adoption of ZT, which is having an impact on the offerings from the security vendor community. Internationally, ZT is gaining traction and is emerging in important security standards. This session highlights important aspects of ZT and provides an update on the state of international activities.