CyberScape: ID Recap
Faced with an executive order to improve cybersecurity, agencies are introducing processes to protect their systems and networks. Amid an evolving technology landscape that incorporates more virtual and cloud environments, application development and data access off premises, securing these systems to prevent unwanted breaches is mandatory. Leaders discuss strategies in zero trust, identity access management and more to bring cybersecurity approaches to the next level.
OMB Lead Talks Cybersecurity Executive Order, Zero Trust Directive
On the heels of President Joe Biden’s Executive Order on Improving the Nation’s Cybersecurity, federal agencies are working toward implementing the order’s mandates, like zero trust, in practical, actionable steps.
- Eric Mill, Senior Advisor on Technology and Cybersecurity to the Federal CIO, OMB
- Moderator: Amy Kluber, Editor-in-Chief, GovCIO Media & Research
Zero Trust's Role in Federal ICAM Solutions
Identity, credential and access management solutions are increasingly critical for federal agencies as they move IT operations to cloud environments. Zero trust principles play an important role in the process of granting certain identities access to certain applications within the cloud. Agency leaders talk how zero trust and ICAM solutions are two sides of the key to optimized cloud security.
- Gerald Caron, CIO, Office of the Inspector General, HHS
- Angelica Phaneuf, CISO, Army Software Factory
- Jane Rathbun, CTO, U.S. Navy
- Jim Richberg, Public Sector CISO and Vice President of Information Security, Fortinet
- Moderator: Kate Macri, Senior Researcher, GovCIO Media & Research
Balancing Security and Privacy in Zero Trust Strategies
As federal agencies improve cybersecurity in accordance with the White House cyber executive order, cyber leaders must balance security and privacy concerns when rolling out identity access management strategies. Hear from federal agencies about how they’re navigating legal and ethical questions while managing identity data to secure their networks.
- Ken Clark, Assistant Director, Information Governance & Privacy, ICE
- Scott Davis, Acting CISO, CBP
- Don Watson, CISO, USPTO
- Moderator: Giovanni Leusch-Carnaroli, Vice President, GovCIO
Army Cloud Office Lead Talks Zero Trust Strategies in Modernization
Fireside Chat
- Paul Puckett, Director, Enterprise Cloud Management Agency, U.S. Army
- Moderator: Kate Macri, Senior Researcher, GovCIO Media & Research
-
A Multi-Pronged Approach to Securing Identity Data
Agencies are relying on strategies like data minimization and supply chain risk assessments to protect sensitive information.7m read -
DOD Zeros in on Culture For Zero Trust Buy-In
Tackling identity management within a zero trust strategy requires a culture shift.7m read -
Flywheel Fridays - A CyberScape Double Album
Join our researchers for a recap of GovCIO Media & Research's recent CyberScape events.
14m listen -
Government Moves to Implement Comprehensive Zero Trust Security
The recent executive order has given shape to a broader move across federal agencies away from a reliance on perimeter security.7m read