Start
May 19, 2022 - 3:00 pm
End
May 19, 2022 - 5:00 pm
No user or device is trusted to access a resource in the Zero Trust paradigm until their identity and authorisation are validated. This technique applies to those who are ordinarily inside a private network, such as an employee working remotely from home on a company computer or on their mobile device while attending a global conference. It also applies to anybody or anything outside the network. It makes no difference how many times you’ve entered the network; your identity isn’t trusted unless it’s verified again and again. Until proven differently, every system, user, and server should be considered untrustworthy.
?️: Thursday, May 19, 2022
⏰: 3.00 PM – Jakarta Time (by Zoom)
Speakers:
Rendy Dharmawijaya – Founder & Director Cyber Crime Mitigating Consulting (PT. Systema Global Solusindo)
Moderator:
Dr. Eka Budiarto – Head of SGU MIT
http://bit.ly/digitalclinicsgu
Master of Information Technology
With Data Science Cyber Security, Data Science Business Informatics and Digital Innovation concentration.
February and August Intake
Online Class Available
[email protected]