Under the high patronage of His Majesty King Mohammed VI may god assist him 🇲🇦
Devoxx Morocco 2023 🇲🇦 October 11-13, Taghazout Agadir, Morocco.
Follow Us On
Under the high patronage of His Majesty King Mohammed VI may god assist him 🇲🇦
Devoxx Morocco 2023 🇲🇦 October 11-13, Taghazout Agadir, Morocco.

Talk details

From Known Threat Detection to Unknown: Advanced Cybersecurity with Zero-Trust
Tools-in-Action (ADVANCED level)
Taroudant C
In today's digital world, cybersecurity heavily relies on known threat indicators to detect attacks. This includes traditional methods like antivirus signatures, heuristic algorithms, sandboxing behaviors, Indicators of Compromise (IoCs), YARA and Sigma rules, LOLBAS, and tactics from MITRE ATT&CK. These approaches identify malicious patterns based on historical data. However, as the cyber landscape expands, they struggle to combat unknown threats like Zero-Day exploits. This vulnerability calls for a paradigm shift in cybersecurity - the adoption of Zero-Trust principles.
Zero-Trust serves as a proactive defense mechanism, aiding in the detection of unknown threats. Instead of dealing with an ever-growing list of malicious elements, Zero-Trust focuses on verifying and allowing only known legitimate behaviors and programs. It involves defining the permissible actions of each installed application.
By implementing Zero-Trust, we create a more secure ecosystem, safeguarding against unforeseen threats while setting the foundation for the future of cybersecurity. This approach enables strategic and pragmatic security measures, ensuring our systems remain protected in an increasingly connected world
bahaeddine hilali
Nucleon Security