Navigating Zero Trust for Cybersecurity
Security leaders are leveraging zero trust’s core principle of “never trust, always verify” to protect their organizations. Cybersecurity requires continuous authentication, micro-segmentation and data-centric security as part of zero-trust implementation.
Leaders from the World Bank Group and Lumen explain how they are building zero-trust architectures, addressing common implementation roadblocks and adapting to evolving cyber threats.
Learn more about:
- The evolution of World Bank Group’s zero trust program.
- How organizations are approaching change management to guide users through zero trust adoption.
- The metrics and indicators security leaders are using to measure success and inform next steps in the journey.
-
Sarah Sybert Managing Editor, GovCIO Media & Research -
Remy Faures CISO, World Bank Group -
Hunter Wright Sr. Manager, Engineering-Federal, Lumen
-
‘Harvest Now, Decrypt Later’ Attacks Push Federal Shift to PQC
Johns Hopkins Applied Physics Lab’s Prathibha Rama said agencies must migrate to PQC as future decryption threats put sensitive data at risk.
2m read -
Adversarial AI Threats Put Pressure on Federal Cyber Defenses
HP Federal keeps tabs on how threat actors exploit AI and what agencies must do to respond.
9m watch -
Navigating Federal Cloud Adoption
HHS leaders share how hybrid cloud strategies are evolving, integrating zero trust and shaping future cloud capabilities.
19m watch Partner Content -
CMS Orders Medicaid Audits in Data-Driven Fraud Crackdown
The agency told states to submit plans within 30 days to verify providers and root out waste, fraud and abuse.
2m read