What is Zero Trust and How Does it Impact Federal Cybersecurity?
Get this snapshot look at zero trust to better understand why zero trust is so critical and how agencies are thinking about it in their technology journey.
Zero trust has become a key component of federal cybersecurity strategies. In this edition of our ABCs of Fed IT series, we unpack the principles behind the buzzword. Get this snapshot look at zero trust to better understand why zero trust is so critical and how agencies are thinking about it in their technology journey.
Featured speakers include:
- Gerald Caron, CIO, ITA
- Angel Phaneuf, CISO, Army Software Factory
- Scott M. St. Pierre, Director Enterprise Networks and Cybersecurity (OPNAC N2N6D), US Navy
- Jay Gazlay, Associate Director, Vulnerability Management Cybersecurity Division, CISA
- Lynette Sherrill, Deputy Assistant Secretary for Information Security and CISO, VA
This video is sponsored by Zscaler
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Looking Back at the First Trump Administration's Tech Priorities
In his first term, Donald Trump supported cybersecurity, space policy and artificial intelligence development.
4m read -
Securing the Expanding Attack Surface in Cyberspace
Agencies undergoing digital transformation face a more intricate threat landscape and a wider threat target for adversaries looking to exploit vulnerabilities. This panel dives into strategies agencies are undertaking to safeguard these complex environments, including zero-trust architecture, vigilant monitoring and robust cybersecurity training.
30m watch -
Elevating Cybersecurity in the Intelligence Community
The Intelligence Community is developing strategies to protect data and strengthen resiliency against emerging cyber threats.
30m watch -
AI Revolutionizes Cybersecurity by Doing What Humans Cannot
Leaders from NSA, GAO and industry say that artificial intelligence can augment the cybersecurity workforce, but the work must be auditable and explainable.
4m read