CyberScape: Zero Trust Breakfast Recap
Fireside Chat: Paving the Way with Zero Trust
The White House Executive Order on Improving the Nation’s Cybersecurity highlighted the need for a new federal cybersecurity approach, but zero trust isn’t a one-size-fits-all solution. For many federal agencies, data quality, standards and governance determine their zero trust readiness. Learn how federal agencies can prepare for a zero trust architecture, starting with data.
Industry Perspective: Sterling Wilson
Panel: ICAM Solutions
As federal agencies continue to develop zero trust architectures and frameworks, accurate and efficient user verification is a key piece to nail down. In environments like health care and law enforcement, speed of verification and layers of privacy protection are even more critical. We’ll talk with federal agencies grappling with these challenges in their mission work and how best practices in ICAM can help.
Panel: SBOMs and Software Security
Federal agencies adopting cloud solutions and integrating new software applications into their cloud-based IT infrastructure need new cyber strategies to secure the software-defined perimeter. The SBOM has emerged as a new way to identify and track potential vulnerabilities in the software supply chain. Hear from cloud and cyber leaders about how they’re using SBOMs and other techniques to secure software applications in the cloud.
Industry Perspective: Mike Epley
Panel: Endpoint Security
Securing cloud user endpoints, such as desktops, laptops and mobile devices, is a major challenge for federal agencies as they move to the cloud and support a distributed workforce. Zero trust principles like ICAM solutions can help, but harmonizing endpoint security goals with mission needs requires flexibility and adaptability. This panel will draw insights on endpoint security in a remote, cloud-based work environment.
Fireside Chat: Kurt DelBene
5 Takeaways from our CyberScape Zero Trust Breakfast
Zero trust is sweeping across government. Following the May 2021 White House Executive Order on Improving the Nation’s Cybersecurity, IT leaders are implementing new structures and systems to build the foundation for zero trust. Government leaders will address topics such as ICAM strategy and software-defined network access structure. Tech-minded leaders from defense and civilian agencies discuss best practices and how this will impact future procurements and their missions.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate . Swipe on mobile.
-
Data Mapping, Operational Understanding Are Next Steps For Zero Trust
Agencies are aligning security and performance needs.
7m read -
Federal Agencies Implementing New Approaches to Software Security
Modernizing approaches to software security leads to better detecting vulnerabilities and preventing zero-day incidents like the SolarWinds attack.
7m read -
GSA Outlines Best Practices for Identity Management
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
7m read -
Data Management Key to Successful Zero Trust Strategy, CISA Says
Data standards and governance determine federal agencies's readiness for zero trust.
7m read -
VA CIO: Zero Trust at the Core of Agency's Vision, Security-Focused Workforce
CIO Kurt DelBene stresses the importance of building the agency's vision and workforce upon the fundamental aspects of zero trust.
7m read