Navigating Zero Trust for Cybersecurity
Security leaders are leveraging zero trust’s core principle of “never trust, always verify” to protect their organizations. Cybersecurity requires continuous authentication, micro-segmentation and data-centric security as part of zero-trust implementation.
Leaders from the World Bank Group and Lumen explain how they are building zero-trust architectures, addressing common implementation roadblocks and adapting to evolving cyber threats.
Learn more about:
- The evolution of World Bank Group’s zero trust program.
- How organizations are approaching change management to guide users through zero trust adoption.
- The metrics and indicators security leaders are using to measure success and inform next steps in the journey.
-
Sarah Sybert Managing Editor, GovCIO Media & Research -
Remy Faures CISO, World Bank Group -
Hunter Wright Sr. Manager, Engineering-Federal, Lumen
-
Building the Digital Foundation for Golden Dome
Microsoft and Red Hat leaders discuss the technology foundation behind the Golden Dome and the future of integrated missile defense.
20m watch -
War Department Advances Zero Trust to Meet 2027 Deadline
Officials detailed efforts to strengthen zero trust, improve cyber resiliency and accelerate secure innovation ahead of the fiscal 2027 federal deadline.
2m read -
Pentagon Shifts to Data-Centric Security to Boost Resilience
Officials are advancing zero-trust, mesh networking and acquisition reform to improve data quality, interoperability and speed.
6m read -
Accelerating Federal Cloud Modernization
IT officials from CMS, DOE and NinjaOne discuss data readiness, security and change management for cloud modernization.
20m watch