Listen "Mastering Step Four of Zero Trust: Policy Creation"
Episode Synopsis
Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules.In this episode of Threat Talks, host Lieuwe Jan and Koning and Field CTO of ON2IT Rob Maas talk through how to create and validate Zero Trust policies.They explore:· What makes a ‘good’ policy (and why broad strokes won’t cut it)· How to apply the Kipling method to policy creation· Why policies need ongoing validation to stay effective Make sure to stay tuned for the second part of this episode as well, where Lieuwe Jan and Rob dive into the specifics of policy for administrative access.Shownotes⁃ Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs⁃ Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc⁃ Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac
More episodes of the podcast Threat Talks - Your Gateway to Cybersecurity Insights
WSUS RCE: Update Weaponized
16/12/2025
From Hacker to Hero
03/12/2025
The Npm Worm Outbreak
25/11/2025
Inside the SalesLoft Breach
18/11/2025
The Secret Diplomats Fighting Cyber Wars
04/11/2025
Patch Smarter, Not Harder
28/10/2025
Why Your Cyber Hygiene Matters?
14/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.