One of the speakers at the Future of Information and Communication Conference is our own Yuri Bobbert, CISO and professor at Antwerp Management School. He’ll be presenting his paper ‘On the Design and Engineering of a Zero Trust Security Artefact’, which discusses ON2IT’s Zero Trust Framework and the ongoing validation of this approach.
Recently, NIST published the Special Publication (NIST SP) for Zero Trust. ON2IT has been implementing Zero Trust based Cybersecurity strategies for over ten years, pushing forward the work of founding father John Kindervag.
The DMZ (Demilitarized zone) model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was the same.
The terms network segmentation and Zero Trust are used more and more, and have become proper buzzwords. We also see an increase in the number of requests ‘to segment the network’. What is actually meant, is if we can help setting up a Zero Trust environment.