Network Segmentation and Enforcement via Policy as Code

Spring 2022

There is much discussion around zero-trust as the new security model to protect workloads in the post perimeter security remote workforce world. But how does zero-trust work? How is network segmentation automated and policy enforced? Is there a new model that improves zero-trust configuration, orchestration and automation via policy as code. This roundtable discussion session is exclusive for IT teams and is to be a requirements gathering exercise. No slides, just sharing best practices and challenges in a safe environment led by ONUG board members and thought leader. Come to learn from your peers and add your requirements.


Related events