Zero Trust for Cyber Resiliency
Cybersecurity leaders from agencies like the Cybersecurity Infrastructure Security Agency (CISA), Defense Department (DOD) and Office of Management and Budget (OMB) provide insights on how they are utilizing zero-trust strategies to secure data, prevent ransomware incidents and help recover from attacks.
Inside, read insights from:
- OMB Senior Advisor Eric Mill on the cybersecurity executive order and how different agencies are approaching new zero trust strategies
- Air Combat Command Director of Intelligence Brig. Gen. Steven Gorski on the role of zero trust in DOD’s recently released JADC2 strategy
- Rubrik Federal’s Global Field CTO David Siles on how zero trust can protect data backups from malicious encryption and deletion
- CISA’s Cyber Defense Specialist Daniel Bardenstein on revamping the CDM program to incorporate zero trust principles
-
Daniel Bardenstein Cyber Defense Specialist, CISA
-
Maj. Gen. Robert Collins Lead, Program Executive Office for Command Control Communications-Tactical (C3T), U.S. Army
-
Mike Dean SATCOM Chief, U.S. Department of Defense
-
Dan Massey 5G Program Lead, U.S. Department of Defense
-
Eric Mill Senior Advisor on Technology and Cybersecurity to the Federal CIO, OMB
-
Brig. Gen. Jeth Rey Director, Army Futures Command’s Cross-Functional Team
-
David Siles Global Field Chief Technology Officer, Rubrik
-
Brig. Gen. Steven Gorski Director of Intelligence at Air Combat Command, U.S. Air Force
-
USPS Amid a Plan to Transform and Secure Mail Operations
CIO Pritha Mehra shares how the Postal Service is bringing its technology and systems up to date.
27m listen -
Connectivity Drives Future of Defense
The Defense Department is strategizing new operating concepts ahead of future joint force operations.
8m read -
How TMF is Helping Agencies Accelerate Tech Modernization
The program launched a new AI pilot to expedite TMF applications as agency leaders urge more to consider applying for funds.
4m read -
Sea-Air-Space: Zero Trust is ‘The Best Approach’ For Military Cybersecurity
Marines Cyber Technology Officer Shery Thomas discusses identity management across networks and devices.
10m watch