{"id":82972,"date":"2025-04-30T06:18:09","date_gmt":"2025-04-30T06:18:09","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82972"},"modified":"2025-05-07T14:04:29","modified_gmt":"2025-05-07T14:04:29","slug":"zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/","title":{"rendered":"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82972\" class=\"elementor elementor-82972\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16b03cad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16b03cad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5396833b\" data-id=\"5396833b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f352f6f elementor-widget elementor-widget-text-editor\" data-id=\"3f352f6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><a id=\"_msocom_1\"><\/a><\/p>\n\n\n\n<p><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a7d9b3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a7d9b3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2984b40\" data-id=\"2984b40\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3bebf5 elementor-widget elementor-widget-text-editor\" data-id=\"c3bebf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> April 29, 2025<br><strong>Time:<\/strong> 9:30 AM AST | 8:30 AM CDT | 7:00 PM IST <br><strong>Topic:<\/strong> Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract:&nbsp;<\/strong>With companies migrating data storage to cloud environments, new approaches to data security and access management are essential in the current threat landscape. Zero Trust Network Access (ZTNA) has emerged as the most prominent security framework for secure access management across networks of all types and sizes, including hybrid cloud environments. ZTNA provides identity-centric access control that helps minimize the attack surface, thereby preventing unauthorized access. This webinar explores the challenges of access management in hybrid cloud environments and how applying Zero Trust principles can strengthen authentication, enforce least privilege access, and reduce security risks. Attendees will also gain insights into enhancing information security, protecting sensitive data, and building a resilient cloud security strategy using ZTNA.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Current threat landscape and challenges of the hybrid cloud model<\/li>\n<li>Role and importance of Zero Trust\u2013based access management in cloud security<\/li>\n<li>Identity-centric access management strategies for cloud environments<\/li>\n<li>Best practices for adopting a Zero Trust model in hybrid cloud<\/li>\n<li>ZTNA deployment case studies in cloud environments<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/brain.jpg\" alt=\"Brian N. Keshwah \" width=\"192\" height=\"256\"><strong>Brian N. Keshwah <\/strong>| Manager | Information\/Cybersecurity Governance | CISO\u2019s Office | Republic Bank Limited<\/p>\n<p><strong>Bio:<\/strong> Brian Keshwah is a seasoned information\/cybersecurity governance manager with over 27 years of multifaceted experience in IT and information security across the financial and professional services industries. Ten of these years were spent within a \u201cBig Four\u201d professional services firm, and over 18 years were spent within the banking and financial services sectors, providing leadership and governance over IT and information security assurance, advisory, implementation and project management practices and initiatives.<\/p>\n<p>Brian\u2019s leadership experience spans a rich mix of IT management, information security and cybersecurity management, internal audit management, IT project management, digital strategy and transformation, enterprise risk management, and general corporate and IT strategic leadership for large financial organizations.<\/p>\n<p>Brian holds an Executive MBA from the Arthur Lok Jack Graduate School of Business \u2013 The University of the West Indies, a B.Sc. (Hons) in Information Systems and Management from the University of Greenwich (UK), EC-Council\u2019s Certified Chief Information Security Officer (CCISO) certification and ISACA\u2019s Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) and Certified in Risk and Information Systems Control (CRISC) certifications.<\/p>\n<p>He plays an integral role within Republic Financial Holdings Limited Group in assessing and leading the information and cybersecurity governance and advisory practices across the Group\u2019s interests.<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<p><iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/QBgFciCfG8o?si=FVzrE2xNEbBS6-sU\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 29, 2025Time: 9:30 AM AST | 8:30 AM CDT | 7:00 PM IST Topic: Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments Watch Now Abstract:&nbsp;With companies migrating data storage to cloud environments, new approaches to data security and access management are essential in the current threat landscape. Zero Trust Network Access&hellip;<\/p>\n","protected":false},"author":32,"featured_media":82978,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82972","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments<\/title>\n<meta name=\"description\" content=\"Discover how ZTNA strengthens cloud security. Learn identity-centric access management strategies and zero trust principles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments\" \/>\n<meta property=\"og:description\" content=\"Discover how ZTNA strengthens cloud security. Learn identity-centric access management strategies and zero trust principles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-30T06:18:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T14:04:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/29-April_465x310-03-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments\",\"datePublished\":\"2025-04-30T06:18:09+00:00\",\"dateModified\":\"2025-05-07T14:04:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/\"},\"wordCount\":419,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/29-April_465x310-03-2.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/\",\"name\":\"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/29-April_465x310-03-2.jpg\",\"datePublished\":\"2025-04-30T06:18:09+00:00\",\"dateModified\":\"2025-05-07T14:04:29+00:00\",\"description\":\"Discover how ZTNA strengthens cloud security. Learn identity-centric access management strategies and zero trust principles.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/29-April_465x310-03-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/29-April_465x310-03-2.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments","description":"Discover how ZTNA strengthens cloud security. Learn identity-centric access management strategies and zero trust principles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments","og_description":"Discover how ZTNA strengthens cloud security. Learn identity-centric access management strategies and zero trust principles.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-04-30T06:18:09+00:00","article_modified_time":"2025-05-07T14:04:29+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/29-April_465x310-03-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments","datePublished":"2025-04-30T06:18:09+00:00","dateModified":"2025-05-07T14:04:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/"},"wordCount":419,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/29-April_465x310-03-2.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/","name":"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/29-April_465x310-03-2.jpg","datePublished":"2025-04-30T06:18:09+00:00","dateModified":"2025-05-07T14:04:29+00:00","description":"Discover how ZTNA strengthens cloud security. Learn identity-centric access management strategies and zero trust principles.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/29-April_465x310-03-2.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/29-April_465x310-03-2.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-in-the-cloud-strengthening-access-across-hybrid-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Zero Trust in the Cloud: Strengthening Access Across Hybrid Environments"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82972"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82972\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82978"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}