The Future of Implementing Zero Trust
Cybersecurity threats are ongoing against government assets and networks, while recent threats have highlighted the challenges of ensuring effective cyber defenses. Enacting zero-trust architectures is a goal of agencies across government to ensure better cybersecurity.
Learn:
- How CISA is aligning its goals with the White House’s.
- The ways that the Navy is connecting CJADC2 with zero-trust goals.
- The Pentagon’s next steps in ZTA implementation.
- CISA’s pillars of zero trust maturity.
Table of Contents:
- Pentagon Eyes Next Step in Zero Trust Implementation
- Zero Trust Synonymous with CJADC2 Operations, Navy Leaders Say
- The Four Pillars of CISA’s Zero Trust Maturity Model Version 2.0
- Deploy Zero Trust Architecture to Secure Systems
- CISA Updates Zero Trust Maturity Model to Align with White House Directives
-
David McKeown Senior Information Security Officer and Deputy Chief Information Officer for Cybersecurity, Department of Defense
-
Lt. Gen. Maria Barrett Commanding General of Cyber Command, U.S. Army
-
Randy Resnick Director, Zero Trust Portfolio Management Office, DOD
-
John Sherman CIO, DOD
-
John Simms Senior Technical Advisor, TIC, CISA
-
Scott St. Pierre Director Enterprise Networks and Cybersecurity (OPNAC N2N6D), US Navy
-
Building the Future AI Infrastructure
Tech leaders are developing new investment, energy capacity and R&D strategies to build an infrastructure to sustain the rapid growth of artificial intelligence.
3m read -
Biden Signs New Tech Executive Orders Before Departing Office
Joe Biden signed two new executive orders this week promoting future cyber and AI priorities before Donald Trump takes office Monday.
5m read -
DODIN Strategy Aims to Outpace Cyber Threats
JFHQ-DODIN Commander Lt. Gen. Paul Stanton says the new "How We Prevail" plan moves from reactive defense to proactive threat mitigation.
4m read -
Preparing for the Future Cyber Landscape
CISA, CFPB and Rubrik discuss how they’re building cybersecurity best practices and developing their workforces to prepare for the future threat landscape and bolster cyber resilience.
30m watch