Home
Categories
EXPLORE
Society & Culture
Comedy
True Crime
Religion & Spirituality
Health & Fitness
Business
Education
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
HN
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/bf/f7/f3/bff7f3d7-7396-6109-71cf-04705753b08c/mza_7618852996947157642.jpg/600x600bb.jpg
Threat Talks - Your Gateway to Cybersecurity Insights
Threat Talks
81 episodes
1 week ago
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
Show more...
Tech News
News
RSS
All content for Threat Talks - Your Gateway to Cybersecurity Insights is the property of Threat Talks and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/40282548/40282548-1705304946266-c50258e269938.jpg
Zero Trust Step 2: Map Transaction Flows
Threat Talks - Your Gateway to Cybersecurity Insights
13 minutes 7 seconds
2 months ago
Zero Trust Step 2: Map Transaction Flows

Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.

 

Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.

 

In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation.


They explore:

✅ How to identify communication paths

⛕The difference between inbound and outbound traffic (and why this matters)

🙋🏼‍♂️Why business owners and business context are essential


Get all the details and

insights on this second step of Zero Trust: mapping the transaction flows.


Additional Resources:

► Zero Trust Step One: https://youtu.be/mC66i-tEEFs

Threat Talks - Your Gateway to Cybersecurity Insights
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!