DOD Zero Trust Chief: We’re at the Start of a Multi-Phased Journey
As the office reviews implementation plans from across the services, Randy Resnick outlines challenges ahead.
The Defense Department’s Zero Trust Portfolio Management Office is currently reviewing implementation proposals submitted from across the services and combatant commands, a process Director Randy Resnick aims to complete over the next few weeks.
At AFCEA TechNet Indo-Pacific, Resnick highlights the pressing need for zero trust within the mission partner environment to enable and automate communications even in a denied or disconnected environment.
Resnick breaks down the challenges ahead as the services move past the planning stages and into procurement for these solutions by summer or fall 2024. He discusses how he anticipates potentially evolving the zero trust strategy beyond the IT environment and into other environments including operational technology and internet of things.
Check out our full coverage of the conference.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Looking Back at the First Trump Administration's Tech Priorities
In his first term, Donald Trump supported cybersecurity, space policy and artificial intelligence development.
4m read -
Securing the Expanding Attack Surface in Cyberspace
Agencies undergoing digital transformation face a more intricate threat landscape and a wider threat target for adversaries looking to exploit vulnerabilities. This panel dives into strategies agencies are undertaking to safeguard these complex environments, including zero-trust architecture, vigilant monitoring and robust cybersecurity training.
30m watch -
Elevating Cybersecurity in the Intelligence Community
The Intelligence Community is developing strategies to protect data and strengthen resiliency against emerging cyber threats.
30m watch -
AI Revolutionizes Cybersecurity by Doing What Humans Cannot
Leaders from NSA, GAO and industry say that artificial intelligence can augment the cybersecurity workforce, but the work must be auditable and explainable.
4m read