Blue Team

Zero Trust for Hybrid Environment - Secure everything - Trust Nothing

Modern enterprise applications are increasingly complex, often combining real-time web-based platforms, batch processing systems, and event-driven messaging architectures. These applications are not only distributed across architectural components but also across multiple infrastructure platforms — spanning legacy on-premise systems, private clouds, and public clouds. On top of this we have full-stack development practices and DevOps pipelines for secure and efficient deployments of application across platforms and environments. In a hybrid enterprise setting, the challenge of securing such applications becomes exponentially greater. A truly Zero Trust approach demands that trust is not assumed anywhere: within the organizational perimeter, between the enterprise and public cloud infrastructures, or even within the public cloud itself. It requires implementing rigorous security at every level — network, data, application authentication, DevOps and beyond. This session will delve into the intricacies of implementing Zero Trust in hybrid deployments. Through a development and architecture mindset driven discussion, we’ll explore how Zero Trust principles can be applied to secure distributed applications, data, and platforms across diverse environments. Attendees will gain insights into practical approaches for creating a 360-degree security model that fundamentally challenges traditional security paradigms by adopting a "never trust, always verify" methodology. Importance: Zero Trust has evolved from a cutting-edge concept to a widely discussed security model, but discussions around Zero Trust in these complex hybrid deployments are often overlooked. This talk aims to fill that gap by addressing professionals across the software community, whether they are developers at the beginning of their careers or seasoned cybersecurity experts.

Dipankar Saha

Dipankar Saha

Dipankar is a seasoned software professional with 20 years of experience, currently serving in a technical leadership role at Royal Bank of Canada(RBC) US Wealth Management. Over the past decade, he has spearheaded the design and implementation of numerous impactful projects, leveraging cutting-edge technologies to address customer challenges and drive business growth. In his current role as Principal Solutions Architect, Dipankar specializes in crafting innovative and secure solution architectures for complex, high-impact initiatives. With over a decade of experience in the finance domain, he has consistently prioritized security as a foundational principle, ensuring the protection of customer data and organizational assets. Dipankar holds multiple professional certifications, including credentials in the security product Okta, underscoring his expertise in identity management and access control. He has mastered secure solution development and architecture, with deep knowledge across key aspects of cybersecurity.

Blue Team

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Zero Trust for Hybrid Environment - Secure everything - Trust Nothing

Modern enterprise applications are increasingly complex, often combining real-time web-based platforms, batch processing systems, and event-driven messaging architectures. These applications are not only distributed across architectural components but also across multiple infrastructure platforms — spanning legacy on-premise systems, private clouds, and public clouds. On top of this we have full-stack development practices and DevOps pipelines for secure and efficient deployments of application across platforms and environments. In a hybrid enterprise setting, the challenge of securing such applications becomes exponentially greater. A truly Zero Trust approach demands that trust is not assumed anywhere: within the organizational perimeter, between the enterprise and public cloud infrastructures, or even within the public cloud itself. It requires implementing rigorous security at every level — network, data, application authentication, DevOps and beyond. This session will delve into the intricacies of implementing Zero Trust in hybrid deployments. Through a development and architecture mindset driven discussion, we’ll explore how Zero Trust principles can be applied to secure distributed applications, data, and platforms across diverse environments. Attendees will gain insights into practical approaches for creating a 360-degree security model that fundamentally challenges traditional security paradigms by adopting a "never trust, always verify" methodology. Importance: Zero Trust has evolved from a cutting-edge concept to a widely discussed security model, but discussions around Zero Trust in these complex hybrid deployments are often overlooked. This talk aims to fill that gap by addressing professionals across the software community, whether they are developers at the beginning of their careers or seasoned cybersecurity experts.

You'll wish you went sooner!

We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!