Listen "Zero Trust Step 2: Map Transaction Flows"
Episode Synopsis
Once you have defined a few protect surfaces (see: Step 1 of Zero Trust-video link below), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another. Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them. In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation. They explore:✅ How to identify communication paths⛕The difference between inbound and outbound traffic (and why this matters)🙋🏼♂️Why business owners and business context are essentialGet all the details andinsights on this second step of Zero Trust: mapping the transaction flows.Additional Resources:► Zero Trust Step One: https://youtu.be/mC66i-tEEFs
More episodes of the podcast Threat Talks - Your Gateway to Cybersecurity Insights
WSUS RCE: Update Weaponized
16/12/2025
From Hacker to Hero
03/12/2025
The Npm Worm Outbreak
25/11/2025
Inside the SalesLoft Breach
18/11/2025
The Secret Diplomats Fighting Cyber Wars
04/11/2025
Patch Smarter, Not Harder
28/10/2025
Why Your Cyber Hygiene Matters?
14/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.