Program



Track A(Hall D)
2025.8.27 13:00 ~ 13:40
mail share facebook share twitter share linkedin share band share kakao
How to Implement Data-Centric Zero Trust Overlay Networks

PRIBIT Technology

Kim Jootae, Executive Vice President


This session outlines practical approaches to implementing emerging security paradigms, with a focus on data-centric security and Zero Trust overlay networks. It will present a case study detailing the design and deployment of a Zero Trust-based overlay architecture aimed at protecting critical assets beyond conventional network boundaries. In addition, the session will address key technical challenges and share operational insights gained during the implementation process. The objective is to propose a structured methodology that enhances data security while maintaining operational efficiency.