{"id":56198,"date":"2020-08-18T18:30:08","date_gmt":"2020-08-18T18:30:08","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56198"},"modified":"2023-06-05T07:11:00","modified_gmt":"2023-06-05T07:11:00","slug":"zero-trust-network-going-beyond-the-traditional-perimeter-defense","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/","title":{"rendered":"Zero Trust Network: Going Beyond the Traditional Perimeter Defense"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56198\" class=\"elementor elementor-56198\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-199fbdf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"199fbdf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11ee7076\" data-id=\"11ee7076\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-255f1449 elementor-widget elementor-widget-text-editor\" data-id=\"255f1449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 24<sup>th<\/sup> Nov, 2021<br \/><strong>Time:<\/strong> 8.45 AM ET\/7.45 AM CDT\/7.15 PM IST<br \/><strong>Topic: <\/strong> Zero Trust Network: Going Beyond the Traditional Perimeter Defense<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong>Zero-Trust Network Access (ZTNA) implies a security posture where no individual user or device is considered trusted and scrutinized through identity and access management security protocols. Where the traditional security postures considered users and devices within an organization&#8217;s physical perimeter to be secure, ZTNA disallows that belief to combat security issues associated with insiders&#8217; threat, remote access, BYOD, and much more. The ZTNA practice has proven to be an effective security measure for organizations to manage secure information access and handle all types of workloads. The tenet of ZTNA is to solve the inherent issues that arise by the unconditional trust placed in the network. Security experts believe the zenith of ZTNA implementation is to render physical security of the transport layer as something that could possibly be disregarded. The current webinar aims to discuss how ZTNA will help organizations solve emerging security issues along with its functioning and implementation.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li style=\"list-style-type: none;\"><ul><li>What does ZTNA mean for security?<\/li><li>How will ZTNA help organizations benefit?<\/li><li>Implementing ZTNA for access and identity management<\/li><\/ul><\/li><\/ul><h4>Moderator:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Amol-Kodag.jpg-1.webp\" alt=\"Amol Kodag\" width=\"200\" \/><\/p><p><strong>Amol Kodag,<\/strong> Engineering Director, R&amp;D, Medtronic Head, Cardiovascular Portfolio, Medtronic Engineering and Innovation Center<\/p><p><strong>Bio:<\/strong> Amol Kodag is a Senior Engineering and Technology leader with a record of leading global R&amp;D teams, developing innovative products and technology platforms, especially in the space of Industrial IoT, Vehicle, and Aerospace. He has critical leadership experience in building &amp; heading various Product and Technology verticals, Centers of Excellence (CoEs), and Connected Solutions (specifically Software, IoT, Cloud, and Cybersecurity).<\/p><p>Amol currently works as Engineering Director \u2013 R&amp;D, Heading the Cardiovascular Portfolio at Medtronic Engineering, and Innovation Center (MEIC) and is focused on building patient-centric connected care solutions.<\/p><hr \/><h4>Panelists:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/jag-headshot-torso-scaled.jpg.webp\" alt=\"Jason Garbis\" width=\"200\" \/><\/p><p><strong>Jason Garbis,<\/strong> Chief Product Officer for Appgate<\/p><p><strong>Bio:<\/strong> Jason Garbis is a CISSP Certified Cybersecurity professional who has completed his Bachelor&#8217;s degree in Computer Science from Cornell University and earned a High-Technology MBA from Northeastern University. As the Chief Product Officer for Appgate, Jason oversees the company&#8217;s security, product strategy, and product management. Also, he leads the research and publication initiatives as the co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance. His 30 years of experience in product management, engineering, and consulting at security and technology firms, including RSA, was primarily concentrated on identity management and governance products. His extensive experience enabled him to author &#8220;Zero Trust Security: An Enterprise Guide.&#8221;<\/p><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/John_Kindervag-scaled.jpg.webp\" alt=\"John Kindervag\" width=\"200\" \/><\/p><p><strong>John Kindervag, <\/strong> Senior Vice President Cybersecurity Strategy, ON2IT, and ON2IT Global Fellow<\/p><p><strong>Bio:<\/strong> Considered one of the world&#8217;s leading cybersecurity experts, John Kindervag is best known for creating the revolutionary Zero-Trust Model. He graduated with a B.A. in Communication from the University of Iowa and lives in Dallas, TX. Since March 2021, he has been working at On2IT as a Senior Vice President Cybersecurity Strategy and ON2IT Global Fellow. Previously, he has worked at Palo Alto Networks as Field CTO for four years and eight and one-half years as a Vice President and Principal Analyst on the Security and Risk Team at Forrester Research.<br \/>As a practitioner, John has served as a security architect, penetration tester, and security consultant. He has been interviewed and published in several esteemed publications, including The Wall Street Journal, Forbes, Bloomberg, and The New York Times. Also, he has featured on television networks such as CNBC, Fox News, PBS, and Bloomberg in discussions revolving around information security. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, InfoSec Europe, ShmooCon, and InfoSec World.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/D7x4K48v-YE\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 24th Nov, 2021Time: 8.45 AM ET\/7.45 AM CDT\/7.15 PM ISTTopic: Zero Trust Network: Going Beyond the Traditional Perimeter Defense Watch Now Abstract: Zero-Trust Network Access (ZTNA) implies a security posture where no individual user or device is considered trusted and scrutinized through identity and access management security protocols. Where the traditional security postures considered&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56198","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust Network- Going Beyond the Traditional Perimeter Defense<\/title>\n<meta name=\"description\" content=\"Zero Trust Network- Going Beyond the Traditional Perimeter Defense explained by the Amol Kodag, Jason Garbis and John Kindervag.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Network: Going Beyond the Traditional Perimeter Defense\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Network- Going Beyond the Traditional Perimeter Defense explained by the Amol Kodag, Jason Garbis and John Kindervag.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T18:30:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:11:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Zero Trust Network: Going Beyond the Traditional Perimeter Defense\",\"datePublished\":\"2020-08-18T18:30:08+00:00\",\"dateModified\":\"2023-06-05T07:11:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/\",\"name\":\"Zero Trust Network- Going Beyond the Traditional Perimeter Defense\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg\",\"datePublished\":\"2020-08-18T18:30:08+00:00\",\"dateModified\":\"2023-06-05T07:11:00+00:00\",\"description\":\"Zero Trust Network- Going Beyond the Traditional Perimeter Defense explained by the Amol Kodag, Jason Garbis and John Kindervag.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero Trust Network: Going Beyond the Traditional Perimeter Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust Network- Going Beyond the Traditional Perimeter Defense","description":"Zero Trust Network- Going Beyond the Traditional Perimeter Defense explained by the Amol Kodag, Jason Garbis and John Kindervag.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Network: Going Beyond the Traditional Perimeter Defense","og_description":"Zero Trust Network- Going Beyond the Traditional Perimeter Defense explained by the Amol Kodag, Jason Garbis and John Kindervag.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T18:30:08+00:00","article_modified_time":"2023-06-05T07:11:00+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Zero Trust Network: Going Beyond the Traditional Perimeter Defense","datePublished":"2020-08-18T18:30:08+00:00","dateModified":"2023-06-05T07:11:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/"},"wordCount":638,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/","name":"Zero Trust Network- Going Beyond the Traditional Perimeter Defense","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg","datePublished":"2020-08-18T18:30:08+00:00","dateModified":"2023-06-05T07:11:00+00:00","description":"Zero Trust Network- Going Beyond the Traditional Perimeter Defense explained by the Amol Kodag, Jason Garbis and John Kindervag.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Zero-Trust-Network_Panel-Discussion-Banner-465x310-0001.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-network-going-beyond-the-traditional-perimeter-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Zero Trust Network: Going Beyond the Traditional Perimeter Defense"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56198"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79098"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}