Discover live virtual and in-person events offered by IEEE groups around the world.
- This event has passed.
Implementing Zero Trust Architecture: Strategies for Modern Cybersecurity in a Perimeterless World
September 10, 2025 @ 7:30 pm – 8:15 pm
Traditional perimeter-based security models can no longer adequately protect against today’s rising cyber threats and the challenges of hybrid workforces. Zero Trust Architecture (ZTA) presents a new approach by enforcing strict identity verification for every user and device attempting to access resources, regardless of their location.
This webinar will explore the principles and tenets of Zero Trust, review the various components of Zero Trust Architecture, and provide a real-world example of application deployment that showcases the key tenets of ZTA. The objective of this practical application is to demonstrate how different aspects of ZTA can be implemented from a practitioner’s perspective, securing both the inbound traffic to the organization’s network and protecting against insider threats. The demonstration will also cover Identity Management, Micro-segmentation, and workload isolation to enhance application security. This implementation offers actionable strategies for enterprises seeking to modernize their security posture. The discussion will conclude with an overview of the proposed ZTA maturity model and a roadmap for applying ZTA principles effectively.
Participants will be able to:
- ○ Understand the tenets of Zero Trust and Zero Trust Architecture
- ○ Take a practical approach to implementing Zero Trust in Azure
- ○ Become familiar with the deployment of Zero Trust within the organization
- ○ Explore strategies for creating a Zero Trust roadmap and discuss them using the Zero Trust maturity model