We're still training perimeter security as one of the main mantras of information security in companies.
I show what perimeter security is and why it is outdated. I will give an alternative to replace permieter security with a zero trust approach and how to implement that in a company network.
This is a talk over a needed change in network architecture as the older approach called perimeter security is not only not effective anymore but actually dangerous for companies.
I will explain why the perimeter security approach is dangerous and why we need to stop doing it.
I'll describe on what to do instead - and how to get there, even in a compliancy heavy company enviroment.
https://creativecommons.org/licenses/by-sa/4.0/