In verband met onderhoud is het tijdelijk niet mogelijk om in te loggen in het Ambition Model. De onderhoudswerkzaamheden vinden plaats tot en met 5 januari 2026. Onze excuses voor het eventuele ongemak. Due to scheduled maintenance, it is temporarily not possible to log in to the Ambition Model. The maintenance activities will continue until 5 January 2026. We apologise for any inconvenience this may cause.

GKB | Cybersecurity Part 3: Establishing a New Zero-trust Boundary

Publicatie 16/12/2024
GKB | Cybersecurity Part 3: Establishing a New Zero-trust Boundary

Cybersecurity

Part 3: Establishing a New Zero-trust Boundary

It should be a baseline requirement for every organization to have processes and controls in place to keep their networks secure. However, as technology has advanced and networks have grown larger and almost unfathomably complex, the standard for what is needed to constitute a secure network has changed. One of the most important changes lies with the transition from a location-centric security model to a more data-centric one. We call this model “zero trust.”

As an IIA member, you can download the report here.