Navigating Zero Trust for Cybersecurity

Security leaders are leveraging zero trust’s core principle of “never trust, always verify” to protect their organizations. Cybersecurity requires continuous authentication, micro-segmentation and data-centric security as part of zero-trust implementation.
Leaders from the World Bank Group and Lumen explain how they are building zero-trust architectures, addressing common implementation roadblocks and adapting to evolving cyber threats.
Learn more about:
- The evolution of World Bank Group’s zero trust program.
- How organizations are approaching change management to guide users through zero trust adoption.
- The metrics and indicators security leaders are using to measure success and inform next steps in the journey.

-
Sarah Sybert Managing Editor, GovCIO Media & Research
-
Remy Faures CISO, World Bank Group
-
Hunter Wright Sr. Manager, Engineering-Federal, Lumen
-
VA Acting CIO Focuses Tech Strategy on 'Cyber Dominance'
VA OIT is restructuring its workforce, revamping risk management and modernizing tech acquisition to deliver secure, efficient services.
4m read -
GAO’s Advice for Bolstering Federal Cybersecurity
Federal agencies face persistent challenges in implementing cybersecurity best practices, but shifting culture, refining hiring practices and enforcing stronger requirements can drive long-term resilience.
10m listen -
Modernizing IT Systems for AI Adoption
USPS, NIH and Lumen discuss how modernization, data strategies and security are shaping AI’s future role in government.
32m watch -
Modernizing Critical Infrastructure in the Face of Global Threats
Officials are expanding the latest strategies in boosting defense infrastructure, including securing satellite communications, upgrading enterprise-wide technology, optimizing data management.
28m watch