According to the marketing hype, Zero Trust is a product to deploy, a few buttons to push, and everything is secure at all times in all ways. In reality, we know it’s never that simple or painless. The same tools that help build amazing apps quickly introduce gaps and assumptions into our application stack that we haven’t considered. To approach a Zero Trust architecture, we have to go back to basics and understand those assumptions and the strengths or weaknesses they introduce.
In this session, we’ll tease apart some of those assumptions, see how they fit together to introduce or mitigate risk throughout our system, and extract principles to improve our security.
High impact blog posts and eBooks on API business models, and tech advice
Connect with market leading platform creators at our events
Join a helpful community of API practitioners
Can't make it to the event? Signup to the Nordic APIs newsletter for quality content. High
impact blog posts on API business models and tech advice.
Become a part of the world’s largest community of API practitioners and enthusiasts. Share your insights on the blog, speak at an event or exhibit at our conferences and create new business relationships with decision makers and top influencers responsible for API solutions.