{"id":25433,"date":"2024-11-06T15:00:42","date_gmt":"2024-11-06T23:00:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/11\/06\/news-19163\/"},"modified":"2024-11-06T15:00:42","modified_gmt":"2024-11-06T23:00:42","slug":"news-19163","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/11\/06\/news-19163\/","title":{"rendered":"\u200b\u200bZero Trust Workshop: Advance your knowledge with an online resource"},"content":{"rendered":"<p><strong>Credit to Author: Mike Adams| Date: Wed, 06 Nov 2024 17:00:00 +0000<\/strong><\/p>\n<p>Microsoft is on the front lines helping secure customers worldwide\u2014analyzing and responding to cybersecurity threats, building security technologies,\u00a0 and partnering with organizations to effectively deploy these technologies for increased security. Many of you have been following as we\u2019ve described our\u00a0<a href=\"https:\/\/www.microsoft.com\/trust-center\/security\/secure-future-initiative\" target=\"_blank\" rel=\"noreferrer noopener\">Secure Future Initiative<\/a>, which is pushing the Zero Trust principles verify explicitly, least privilege and assume breach into the programmatic approach of Secure by Design, Secure by Default, and Secure Operations across Microsoft consistently, durably and at scale. In the Microsoft Security division, we are also focused on helping our customers deploy our suite of security products to protect themselves from cyber threats. We know that most of our customers are embarking on a Zero Trust journey, but many struggle with the enormity of the opportunity: where to start, what to do next, and how to measure progress.\u00a0<\/p>\n<p>We are announcing a resource to help our customers answer these questions: The <a href=\"https:\/\/aka.ms\/ZTWorkshop\">Microsoft Zero Trust Workshop<\/a>, a self-service tool to help you plan and execute your Zero Trust journey guide by yourself or with the guidance of a partner.<\/p>\n<p>The Zero Trust Workshop lets you customize your organization\u2019s end-to-end security deployment to your unique business needs and your environment with a powerful tool that: provides a comprehensive assessment of zero trust capabilities learned from hundreds of deployments;&nbsp;guides you with a visual easy-to-use tool that explains each step of the journey; and delivers a digital artifact that you and your team can use to plan and prioritize your next steps and to compare and measure progress regularly.&nbsp;<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/MSFT_M365_Apr_SecurityGIF12_Blog_GIF_240410_FINAL-2.gif\" class=\"card-img img-object-cover\" alt=\"\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Zero Trust Workshop<\/h2>\n<div class=\"mb-3\">\n<p>A comprehensive technical guide to help customers and partners adopt a Zero Trust strategy and deploy security solutions end-to-end to secure their organizations.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/aka.ms\/ZTWorkshop\" class=\"btn btn-link text-decoration-none p-0\" > \t\t\t\t\t\t\t\t<span>Learn more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"how-our-workshop-helps-customers-and-partners-solidify-their-zero-trust-strategy\">How our workshop helps customers and partners solidify their Zero Trust strategy&nbsp;<\/h2>\n<p>Over the past year, we have piloted this workshop with more than 30 customers and partners. They have consistently told us that this provides them with the clarity, coverage, and actionable guidance they need to secure their organization within each <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a> pillar and across the pillars. When asked how likely they are to recommend the workshop to their partner teams or to other customers, customers give the workshop a net promoter score of 73.<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The layout and question structure is fantastic as it provokes a fair amount of thought around adding each of the capabilities to take a multi-faceted approach to authentication and authorization.<\/p>\n<p><em>\u2014Senior vice president at a major financial institution<\/em><\/p>\n<\/blockquote>\n<p>Security is a team sport, and we recognize that customers often need security partners to help them plan and execute their security strategy. This is why we partnered with several deployment partners across the pillars of Zero Trust to get their feedback on the workshop and how they would use it to help their customers. <\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The Zero Trust Workshop is a great starting point for our customers who want to embrace Zero Trust principles, but don\u2019t know how to align the technology they already own. Furthermore, the workshop allows our customers to measure the progress they\u2019ve made and aim for the next incremental hardening of the Zero Trust model, which is part and parcel of the Zero Trust manner of thinking. As a Microsoft partner and as an MVP, I advocate that customers use the materials provided by Microsoft, including these workshops, to measure and further their security posture. <\/p>\n<p>\u2014<em>Nicolas Blank, NBConsult<\/em><\/p>\n<\/blockquote>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>[The Zero Trust workshop] has enabled Slalom to help clients accelerate their efforts towards a comprehensive cyber resilience strategy. It provides a clear picture of an organization\u2019s current state and provides a template for order of operations and best practices in a very tidy package. It\u2019s an easy-to-use tool with a huge impact, and our clients and workshop participants have been very impressed by how it organizes and prioritizes a complex set of operations in an approachable and manageable way.<\/p>\n<p>\u2014<em>Slalom<\/em><\/p>\n<\/blockquote>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-75 btn-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/ZTWorkshop\">Please try the Zero Trust Workshop<\/a><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"how-to-start-using-the-workshop-to-plan-your-zero-trust-journey\">How to start using the workshop to plan your Zero Trust journey<\/h2>\n<p>The Zero Trust Workshop is comprised of two main components, all in one handy file you can download and use to drive these conversations:&nbsp;<\/p>\n<ul class=\"wp-block-list\">\n<li>The Zero Trust Basic Assessment (optional): For customers starting on their Zero Trust journey, the assessment is a foundational tool that customers can run before the workshop to check for common misconfigurations and gaps in settings (for example, having too many global admins) to remediate before starting to enable the security features and capabilities of a Zero Trust journey.\u00a0\u00a0<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>The Zero Trust Strategy workshop: This is a guided breakdown of the Zero Trust areas according to the standard Zero Trust pillars (Identity, Devices, Data, Network, Infrastructure and Application, and Security Operations). For each pillar, we walk you through the associated areas with a proposed \u201cdo this first, consider this then, think about this next\u201d order to how you should tackle them. For each area and capability, you have guidance on why it matters and options to address it and then can discuss it with your stakeholder and decide if this is something you already did, something you are going to do, or something you do not plan to implement at this time. As you progress through the different boxes and areas, you create an artifact for your organization on how well-deployed you are in this Zero Trust pillar and what are the next areas to tackle. &nbsp;<\/li>\n<\/ul>\n<p>Now, we are launching the Identity, Devices, and Data pillars. We will add the Network, Infrastructure and Application, and Security Operations in the coming few months. The <a href=\"https:\/\/aka.ms\/ZTWorkshop\">website for the workshop<\/a> will announce these as they become available.<\/p>\n<figure data-wp-context=\"{&quot;uploadedSrc&quot;:&quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture1-1.png&quot;,&quot;figureClassNames&quot;:&quot;wp-block-image size-full&quot;,&quot;figureStyles&quot;:null,&quot;imgClassNames&quot;:&quot;wp-image-136307 webp-format&quot;,&quot;imgStyles&quot;:null,&quot;targetWidth&quot;:546,&quot;targetHeight&quot;:454,&quot;scaleAttr&quot;:false,&quot;ariaLabel&quot;:&quot;Enlarge image: Example of the apps and users area of the Identity pillar of the workshop.&quot;,&quot;alt&quot;:&quot;Example of the apps and users area of the Identity pillar of the workshop.&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture1-1.webp\" alt=\"Example of the apps and users area of the Identity pillar of the workshop.\" class=\"wp-image-136307 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture1-1.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Example of the apps and users area of the Identity pillar of the workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"context.imageButtonRight\" \t\t\tdata-wp-style--top=\"context.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><figcaption class=\"wp-element-caption\">Figure 1. Example of the apps and users area of the Identity pillar of the workshop.<\/figcaption><\/figure>\n<figure data-wp-context=\"{&quot;uploadedSrc&quot;:&quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1.png&quot;,&quot;figureClassNames&quot;:&quot;wp-block-image size-large&quot;,&quot;figureStyles&quot;:null,&quot;imgClassNames&quot;:&quot;wp-image-136308 webp-format&quot;,&quot;imgStyles&quot;:null,&quot;targetWidth&quot;:1223,&quot;targetHeight&quot;:733,&quot;scaleAttr&quot;:false,&quot;ariaLabel&quot;:&quot;Enlarge image: Example of the strategy and co-management areas of the Devices pillar of the workshop.&quot;,&quot;alt&quot;:&quot;Example of the strategy and co-management areas of the Devices pillar of the workshop.&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large wp-lightbox-container\"><img decoding=\"async\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1-1024x614.webp\" alt=\"Example of the strategy and co-management areas of the Devices pillar of the workshop.\" class=\"wp-image-136308 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1-1024x614.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1-300x180.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1-768x460.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1.webp 1223w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture2-1-1024x614.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Example of the strategy and co-management areas of the Devices pillar of the workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"context.imageButtonRight\" \t\t\tdata-wp-style--top=\"context.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><figcaption class=\"wp-element-caption\">Figure 2. Example of the strategy and co-management areas of the Devices pillar of the workshop.<\/figcaption><\/figure>\n<figure data-wp-context=\"{&quot;uploadedSrc&quot;:&quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3.png&quot;,&quot;figureClassNames&quot;:&quot;wp-block-image size-large&quot;,&quot;figureStyles&quot;:null,&quot;imgClassNames&quot;:&quot;wp-image-136309 webp-format&quot;,&quot;imgStyles&quot;:null,&quot;targetWidth&quot;:1242,&quot;targetHeight&quot;:814,&quot;scaleAttr&quot;:false,&quot;ariaLabel&quot;:&quot;Enlarge image: Example of the identification, classification and protection areas of the Data pillar of the workshop.&quot;,&quot;alt&quot;:&quot;Example of the identification, classification and protection areas of the Data pillar of the workshop.&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large wp-lightbox-container\"><img decoding=\"async\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3-1024x671.webp\" alt=\"Example of the identification, classification and protection areas of the Data pillar of the workshop.\" class=\"wp-image-136309 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3-1024x671.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3-300x197.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3-768x503.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3.webp 1242w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture3-1024x671.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Example of the identification, classification and protection areas of the Data pillar of the workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"context.imageButtonRight\" \t\t\tdata-wp-style--top=\"context.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><figcaption class=\"wp-element-caption\">Figure 3. Example of the identification, classification and protection areas of the Data pillar of the workshop.<\/figcaption><\/figure>\n<p>I invite you to check out the <a href=\"https:\/\/aka.ms\/ZTWorkshop\">Zero Trust Workshop site<\/a> where we have detailed training videos and content.&nbsp;<\/p>\n<p>For our valued security deployment partners, the workshop is also included in the recently launched <a href=\"https:\/\/learn.microsoft.com\/security\/zero-trust\/zero-trust-partner-kit\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Partner kit<\/a> where, as a partner, you can take the workshop material and customize it for your customer engagements based on your needs.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"closing-thoughts\">Closing thoughts<\/h2>\n<p>We all need to work together to help secure the world we live in and keep people safe with the intention of collective defense. As shared in the most recent <a href=\"https:\/\/aka.ms\/mddr\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report<\/a>, the cyber threat landscape is ever-growing and requires a collaborative approach between product vendors, security experts, and customers to help protect everyone. In the spirit of working with the wider ecosystem to help secure all customers, we recently partnered with NIST\u2019s NCCoE and more than 20 security vendors to publish a guide on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/06\/how-microsoft-and-nist-are-collaborating-to-advance-the-zero-trust-implementation\/\">how to adopt NIST\u2019s Zero Trust reference architecture<\/a> using Microsoft\u2019s Security products and this is another example of us working with all of you deploying security out there to help secure the ecosystem.\u00a0<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/ZTWorkshop\">Give the Zero Trust Workshop a try<\/a><\/div>\n<\/p><\/div>\n<p>We would love to hear how you are using it. Use the feedback form on the site to share with us how we can improve it to help your organization implement a Zero Trust journey.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"additional-resources-to-accelerate-your-zero-trust-journey\">Additional resources to accelerate your Zero Trust journey&nbsp;<\/h2>\n<p>This joins a library of other resources to guide your security modernization and Zero Trust journey, including:&nbsp;<\/p>\n<ul class=\"wp-block-list\">\n<li>The <a href=\"https:\/\/aka.ms\/ZTGuide\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Guidance center<\/a><\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>The <a href=\"https:\/\/aka.ms\/SAF\">Microsoft Security Adoption Framework (SAF)<\/a> which includes the <a href=\"https:\/\/aka.ms\/MCRA\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Cybersecurity Reference Architecture<\/a> and the <a href=\"https:\/\/aka.ms\/CISOworkshop\">Chief Information Security Officer (CISO)&nbsp;Workshop<\/a>.<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u202fBookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us at\u202f<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/06\/zero-trust-workshop-advance-your-knowledge-with-an-online-resource\/\">\u200b\u200bZero Trust Workshop: Advance your knowledge with an online resource<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/06\/zero-trust-workshop-advance-your-knowledge-with-an-online-resource\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mike Adams| Date: Wed, 06 Nov 2024 17:00:00 +0000<\/strong><\/p>\n<p>\u200bAs part of Microsoft\u2019s ongoing efforts to support security modernization and the Zero Trust principles, we\u2019ve launched Zero Trust Workshop, an online self-service resource. Read our latest blog post for details.  \u200b<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/06\/zero-trust-workshop-advance-your-knowledge-with-an-online-resource\/\">\u200b\u200bZero Trust Workshop: Advance your knowledge with an online resource<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25433","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25433"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25433\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}