According to the marketing hype, Zero Trust is a product to deploy, a few buttons to push, and everything is secure at all times in all ways. In reality, we know it’s never that simple or painless. The same tools that help build amazing apps quickly introduce gaps and assumptions into our application stack that we haven’t considered. To approach a Zero Trust architecture, we have to go back to basics and understand those assumptions and the strengths or weaknesses they introduce.
In this session, we’ll tease apart some of those assumptions, see how they fit together to introduce or mitigate risk throughout our system, and extract principles to improve our security.
High impact blog posts and eBooks on API business models, and tech advice
Connect with market leading platform creators at our events
Join a helpful community of API practitioners
Can't make it to the event? Signup to the Nordic APIs newsletter for quality content. High impact blog posts on API business models and tech advice.
Nordic APIs will use the information you provide on this form to provide updates and news.
You can change your mind at any time by unsubscribing from any email you receive from us or by contacting us at info@nordicapis.com. We will treat your information with respect. By clicking below, you agree that we process your information per the terms in our Privacy Policy.
We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices.
Become a part of our global community of API practitioners and enthusiasts. Share your insights on the blog, speak at an event or exhibit at our conferences and create new business relationships with decision makers and top influencers responsible for API solutions.