1. What is Zero-trust 2. How to Zero-trust 3. Zero-trust on the Network 4. Zero-trust Identity 5. Cloud and Zero-trust 6. 5G and Zero-trust 7. Governance 8. OT and Zero-trust Security 9. The Next Steps
Tom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: "The Art of War Fort Cyber Security", published by Springer, and "Security Architecture – How and Why", published by River Publishers.