Hey everyone, welcome to another video! Please make sure to read the description for the chapters and key information about this video and others. ⚠ P L E A S E N O T E ⚠ 🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there! 🕰 I don't discuss future content nor take requests for future content so please don't ask 😇 Thanks for watching! 🤙
This is one of your most important videos focusing on identity, modern workplace, devices, monitoring and more. I have been advocating this massively the last couple of years. Microsofts Defender platform has become a markert leader and is getting a lot of attention and momentum. Microsoft Sentinel is a game-changer and you should create a separate video on it. Keep em coming!!
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
I referred to your videos and passed on the Microsoft Security, Compliance, and Identity Fundamentals last weekend, and now I am watching this video it really makes perfect sense. Security is everything and you explained well the importance of it. Thanks for your amazing videos, John.
John Super explanation covering almost all aspects of a complex topic. Appreciate your efforts behind this evening sharing the whiteboard screen in the link 👍
I've been slowly developing a ZTNA + SDWAN infrastructure for my corp and though I was already doing a lot of this, this video was essential in filling in the gaps to my solution. Extremely well done video.
For TRUST Trust metrics, testing, and controls you need the OSSTMM, The OSSMM also said "Trust is a vulnerability" years before "zero trust" was "invented"
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
We're trying to push our organization to a Zero Trust strategy. One roadblock we're experiencing revolves around 802.1x authentication for our Azure AD Joined devices. We have discussed possibly using a User certificate but the security team is opposed to this as it is less secure than a device cert. Only problem that we have with that is Azure AD only devices (not hybrid joined) can't receive device certs (at least not that I'm aware of). What would be the proper zero trust strategy to get around this? We are struggling to find alternatives as well if this is just not an option. Any suggestions would be greatly appreciated! Also great video, glad I found your channel!
Respectfully John I'd like to suggest the 'bring it all together' discussion should include Defender for Cloud. CSPM (cloud security posture management) in the form of Azure policy is a form of automated compliance controls. Throw in the AWS/GCP connectors and Azure Arc for on prem and you add a lot to your zero trust solution.
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
Quick question. How does MFA reduce fishing attacks? Do you mean that less accounts are compromised, so less "internal-based" phishing? Thanks and love your content!
Another great video John! I am currently studying for my CCSP and az-305 so for me at least this video was the perfect blend of MS and essential cloud security principles. 🙏🙏
The OSSTMM said Trust is a vulnerability WAY before John K. "invented" it. not to mention Stephen Marsh actually invented Zero Trust in 1994. Tired of the facts getting mixed.
Hey everyone, welcome to another video! Please make sure to read the description for the chapters and key information about this video and others.
⚠ P L E A S E N O T E ⚠
🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
Thanks for watching!
🤙
"...that's a bit sus." lol. It's the subtle humor I enjoy the most. Great content as always, John!
This is one of your most important videos focusing on identity, modern workplace, devices, monitoring and more. I have been advocating this massively the last couple of years. Microsofts Defender platform has become a markert leader and is getting a lot of attention and momentum. Microsoft Sentinel is a game-changer and you should create a separate video on it. Keep em coming!!
This is a masterclass in itself. Such a broad area covered with so much clarity. Genius !!
Many Thanks John
Very welcome
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
One of the best videos on this topic I ever seen. Your page is truly in a class of its own.
I referred to your videos and passed on the Microsoft Security, Compliance, and Identity Fundamentals last weekend, and now I am watching this video it really makes perfect sense. Security is everything and you explained well the importance of it. Thanks for your amazing videos, John.
This is the best video I've watched about Zero Trust and having all pieces explained and brought together.
Glad you enjoyed it!
Excellent!
I'm in a smaller company and in August we move to business central so almost everything is authenticated through azure ad
As always, the Maestro makes it so easy to understand. Many thanks mate.
Happy to help
John Super explanation covering almost all aspects of a complex topic. Appreciate your efforts behind this evening sharing the whiteboard screen in the link 👍
Glad it was helpful!
your channel is liquid gold
Thank you, this has helped me with my SC900 training!
The part where you looked into my eyes and said, "This is huge"
Great video, as always!
For a lost soul in Microsoft stack like me, this channel is a light in dark
Thanks, I need to roll out MFA in my company and think about Zero Trust. This has helped me understand alot!
I've been slowly developing a ZTNA + SDWAN infrastructure for my corp and though I was already doing a lot of this, this video was essential in filling in the gaps to my solution.
Extremely well done video.
this video ended my search...one of the best... tutorials..
Very useful explanation of Zero Trust. Thanks ! Your biceps might be the strongest defense against a breach. 💪
Another EXCELLENT section. Thanks John!!!
A glorious presentation! (as always, if I might add). Keep on delivering all of that good stuff! 💪🏻
This is one of your most important videos
Every components of Zero Trust platform is well explained. It felt like a fast track , content loaded, super duper course. Thanks
For TRUST Trust metrics, testing, and controls you need the OSSTMM, The OSSMM also said "Trust is a vulnerability" years before "zero trust" was "invented"
WOW!!! I got connected to your channel a few days ago, I appreciate your videos.
Welcome!
Great video and a fantastic breakdown of the Zero Trust concept! Thanks!
As always, you rock Mr. John!
🫵
Wow, really amazing content. As a non cyber Manager this was totally approachable. Thank you for this!!
Glad it was helpful!
Signals, signals, signals! Thanks for the great video.
this is gold, one of your best videos
Great content John, many thanks.
Awesome Work John!!! LOVE your videos
As always, AWESOME John!!
Excellent as usual!
amazing as always :) You are a Hero .
Great work, thanks John
Incredible content, congratulations. Thank you!
Glad you enjoyed it!
Excellent description of Zero Trust and Defense in Depth Concepts. Thanks again!
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
Fantaastic video man! Lots of questions though…
Glad you enjoyed!
Absolutely on point once again Mr Savill, BRAVO!!
I knew there was a reason I liked you. Old Vax/VMS man here myself.
Good old days :)
We're trying to push our organization to a Zero Trust strategy. One roadblock we're experiencing revolves around 802.1x authentication for our Azure AD Joined devices. We have discussed possibly using a User certificate but the security team is opposed to this as it is less secure than a device cert. Only problem that we have with that is Azure AD only devices (not hybrid joined) can't receive device certs (at least not that I'm aware of). What would be the proper zero trust strategy to get around this? We are struggling to find alternatives as well if this is just not an option. Any suggestions would be greatly appreciated! Also great video, glad I found your channel!
Intune and other MDM can issue device certs.
Respectfully John I'd like to suggest the 'bring it all together' discussion should include Defender for Cloud. CSPM (cloud security posture management) in the form of Azure policy is a form of automated compliance controls. Throw in the AWS/GCP connectors and Azure Arc for on prem and you add a lot to your zero trust solution.
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
Superb video as always John, a much needed but often overlooked consideration!
Glad you enjoyed it
Thank you for covering that topic!
My pleasure!
Thank You John for great video
Amazing video!
Greatly appreciated as always - insanely good session!
Glad you enjoyed it!
Thanks John - another great video.
Glad you enjoyed it
Great video, very well explained and covers it all! Thank you.
Amazing video, so clear and concise. Thank you for sharing it.
Very detailed explanation, than you so much.
You are welcome!
Very, very good.
I was waiting for your video on this topic - thank you very much John for all your hardwork !! #StayBlessednHappy
Same to you!
This is a great explanation!, thank you John!
Quick question. How does MFA reduce fishing attacks? Do you mean that less accounts are compromised, so less "internal-based" phishing? Thanks and love your content!
Harder to trick a user with dummy site asking for username and password if then still need mfa to use
very good session , thanks for your efforts to spread knowledge, you have a gift to explain complex things in a simple way. 🙏
Thank you 🙏
Nice video for preparing sc-100 exam
Excellent ❤
great video!
Super helpful, as always John !! #StayBlessednHappy
Super interesting and well persented! Thank you
Glad it was helpful!
Another great video John! I am currently studying for my CCSP and az-305 so for me at least this video was the perfect blend of MS and essential cloud security principles. 🙏🙏
Great video, thanks!
Another great content video by John and I like the YTSilver Play Button 👍
Thanks 👍
Great video thanks :-)
Thank you
Hi John i would like to see all your videos but i would like you to recommend me the order of all of your videos. and also share them.
learn.onboardtoazure.com :)
The OSSTMM said Trust is a vulnerability WAY before John K. "invented" it. not to mention Stephen Marsh actually invented Zero Trust in 1994. Tired of the facts getting mixed.
Very Nice.
Thanks!
on point !
amazing video
Thanks!
amazing
sweet play button
Excellent. With so much BS around the term, this was really well done.
Thank you our saviour buff Microsoft Jesus
Lol
🤔-🤖-👾-🎤-🥁-🎤-✌🏿