VA Eyes Emerging Technology in Zero Trust Goals
The agency is looking to keep pace with the rate of technical change as a foundation of its enterprise cybersecurity strategy.

The Department of Veterans Affairs is looking to use emerging technologies in ways that also meet its broader goals of adopting zero trust security, which is driving a more unified approach to technology adoption across the agency.
This is a special concern for VA due to its exceptional scope of responsibility and size of the agency as well as the variable security concerns these produce. This drive to modernize an enterprise of VA’s breadth has spurred a corresponding focus on ensuring this process is managed in a way that protects critical data and information systems.
Recently, this has driven VA to focus on anticipating and meeting the rate of technological change rather than being purely reactive.
“There are 170-plus VA hospitals out there that we’re constantly figuring out how to adjust policy for. So we’re constantly having to look into where health care is going, where technology is going, so that we can enact some change. We’re staring pilots to collaborate with vendors so we can get some provisions in place, so we can see where both the health care and technology are going in the future in the hopes of improving health care for veterans,” said Joseph Ronzio, deputy CTO at the Veterans Health Administration, at ATARC’s Zero Trust Summit Tuesday.
A key component of VA’s health care modernization has been using mobile devices and remote capacities that provide a new speed and access to care while presenting distinct security vulnerabilities. Reconciling these as part of a cohesive process has quickly become one of VA’s major IT security goals.
“We’re constantly trying to push the envelope of how we get further out there and have more mobile devices for both patients and providers with more data coming from different edge devices,” Ronzio said. “It gets to be very difficult to govern because the type of data being provided could potentially be making a life-or-death decision for a patient. So how do you balance your security with your functionality in the long run, and then how do you afford to secure all those devices?”
Meeting these goals will require a consolidation of security protocol, especially in providing a singular kind of evaluation for determining whether a device or piece of software adopted from the private sector is up to the broader security standards of an organization of VA’s size.
“We’re not always getting a holistic look at security from a device or even from an application perspective. So we do have problems where different systems, especially within medical technologies, will go through a HIPAA audit and say, ‘Well we’re HIPAA-compliant.’ Well, that’s great, but how about FISMA? And we have that split between what the government requires versus the general population. And I really think that we need more people to understand how truly everything needs to be secured,” Ronzio said.
The general divide in security protocol between individual organizations, and between the government and private sector more broadly, is another challenge that VA technologists are attempting to address while implementing these new capacities. This has become a particular concern with the greater data and device dispersal that comes with a modernizing network.
“We do have that problem where it’s split. Either you’re doing industry business or you’re doing government business. And if you’re in the government business, especially in health care, you have to have a high level of security,” Ronzio said.
Ronzio has found that sustaining internal discussion between separate departments — particularly those responsible for enterprise security and end-user operations — has been a useful means of fostering a stronger culture of security that reconciles their separate priorities around unified zero trust standards.
“You do need the end user to participate in that discussion and evaluate how valuable their data is and what’s at risk,” Ronzio said.
VA tech leadership ultimately ties these concerns directly back to applied data and interoperability, with the development of capacities like a modernized health record system providing both a greater continuity of care and greater information vulnerabilities that the agency seeks to address in tandem.
“If you’re a veteran, when you first come into the service your first record might be done when you’re 16 or 17. And now you’re going to have that transition to the VA, we’re going to have to keep it for the rest of their life,” Ronzio said. “Everyone wants to talk about data modernization, but I don’t think they have a grasp of how that reflects within the mission as much as I think they should.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Accelerates Software Modernization with Agile DevSecOps Push
The Pentagon's software implementation plan tackles cultural hurdles and integrates security early to deliver critical capabilities faster.
6m read -
VA's Platform One Powers Rapid Innovation to Bolster Digital Services
VA's Platform One accelerates software development timelines from weeks to hours, ultimately enhancing digital services for veterans.
5m read -
The Next AI Wave Requires Stronger Cyber Defenses, Data Management
IT officials warn of new vulnerabilities posed by AI as agencies continue to leverage the tech to boost operational efficiency.
5m read -
Federal CIOs Push for ROI-Focused Modernization to Advance Mission Goals
CIOs focus on return on investment, data governance and application modernization to drive mission outcomes as agencies adopt new tech tools.
4m read -
Trump Executive Order Boosts HBCUs Role in Building Federal Tech Workforce
The executive order empowers HBCUs to develop tech talent pipelines and expand access to federal workforce opportunities.
3m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
IHS Prepares to Deploy PATH EHR at Pilot Sites in 2026
IHS targets PATH EHR pilot in 2026, emphasizing governance, collaboration and interoperability as key pillars of the modernization strategy.
4m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
FEHRM CTO Targets Two-Year Cloud Migration for Federal EHR
Lance Scott touts new EHR tech advancements, including cloud migration, expanded data exchange and AI integration to improve care delivery.
4m read -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch