BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.openfest.org//openfest-2025//P9DQT3
BEGIN:VTIMEZONE
TZID:EET
BEGIN:STANDARD
DTSTART:20001029T050000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:EET
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:EEST
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-openfest-2025-MBU98D@cfp.openfest.org
DTSTART;TZID=EET:20251019T160000
DTEND;TZID=EET:20251019T164000
DESCRIPTION:Securing modern IT systems needs a new game plan\, and Zero Tru
 st Network Access (ZTNA) is that plan. ZTNA operates on the principle of "
 never trust\, always verify\," checking every single access attempt to any
  part of your environment\, rather than trusting users or devices just bec
 ause they're on your network. This modern approach means you can finally d
 itch clunky\, traditional VPNs that grant overly broad access and stop exp
 osing your services directly to the public internet. Instead\, ZTNA can he
 lp you create a secure\, controlled 'mesh' between your applications and u
 sers\, or establish secure peer-to-peer tunnels\, all based on verified id
 entity. We'll demonstrate how this strong\, identity-focused strategy\, pa
 rticularly by utilizing temporary\, short-lived access credentials\, direc
 tly addresses significant security concerns\, such as the risks associated
  with easily stolen or misused long-lived SSH keys.\n\nYou will learn to:\
 n* Apply ZTNA principles for robust\, identity-driven infrastructure secur
 ity.\n* Leverage ephemeral authentication to eliminate static credential r
 isks (like SSH keys).\n* Outline actionable steps to implement ZTNA and fo
 rtify your access.
DTSTAMP:20260308T135457Z
LOCATION:Hall A
SUMMARY:Zero Trust Network Access by Design: Short-Lived Certs\, No VPNs\, 
 No Keys - Valentin Hristev
URL:https://cfp.openfest.org/openfest-2025/talk/MBU98D/
END:VEVENT
END:VCALENDAR
