ZTNA Architecture: Insights into Network and InfoSec

You are here:
Date: August 29 2025
Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST

Topic: ZTNA Architecture: Insights into Network and InfoSec

Watch Now

Abstract: With businesses expanding their digital network and storage across various environments such as Cloud, IoT, SaaS, VPN, etc., the need for robust access management is more imminent than ever. The traditional security paradigms must evolve from network perimeter security to a ZTNA (Zero Trust Network Access) approach to implement stricter and secure access management. ZTNA enables secure access based on identity and behavior access management policies with an aim to reduce the attack surfaces and minimize chances for lateral movement for an attack. The current webinar aims at the ZTNA architecture from both networking and information security perspectives. The webinar aims to equip network and IT security professionals with the knowledge to evaluate and implement a Zero Trust approach that aligns with their organization’s evolving risk posture.

Key Takeaways:

  • Core components and architectural models of ZTNA
  • How ZTNA redefines secure access in hybrid and multi-cloud environments
  • The intersection of ZTNA with identity, device posture, and micro-segmentation
  • Real-world implementation challenges and best practices
  • ZTNA vs. traditional VPNs and legacy access models

Speaker:
Tejas Shroff, Senior Director of Managed Security Services, NTT DATA Services

Bio: Tejas Shroff is the Senior Director of Managed Security Services at NTT DATA, where he leads the identity and access management practice. He is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cybersecurity courses to graduate students at the Jindal School of Management. Tejas is a board member of the FBI-affiliated non-profit InfraGard National, serves on the advisory board for Collin College’s cybersecurity program, and mentors the UTD Cybersecurity Club.

Share this Article

Facebook
Twitter
LinkedIn
WhatsApp
Pinterest

You may also like

Train with EC-Council

  • By clicking the Submit button, I give my consent to the processing of my personal data, including for promotional purposes, as provided in the Privacy Policy, and agree to the Terms.

Cyber Talks
Recent Posts