
Identity Management: around the Hash Table.
CISO Perspectives (public)
00:00
Zero Trust - Identity and Access Controls
The origins of zero trusts were really around net working, in network segmentation and things like that. In higher aird, networks have never been architected the way they have been in private sector. So when i started thinking about zero trust here at ohio state, one, i couldn't use the term zero trust, because that made people immediately go, whi you don't trust me. Secondly, i called it context aware authentication, which was a really big mouthful.
Transcript
Play full episode