Navigating Zero Trust for Cybersecurity

Security leaders are leveraging zero trust’s core principle of “never trust, always verify” to protect their organizations. Cybersecurity requires continuous authentication, micro-segmentation and data-centric security as part of zero-trust implementation.
Leaders from the World Bank Group and Lumen explain how they are building zero-trust architectures, addressing common implementation roadblocks and adapting to evolving cyber threats.
Learn more about:
- The evolution of World Bank Group’s zero trust program.
- How organizations are approaching change management to guide users through zero trust adoption.
- The metrics and indicators security leaders are using to measure success and inform next steps in the journey.


-
Sarah Sybert Managing Editor, GovCIO Media & Research
-
Remy Faures CISO, World Bank Group
-
Hunter Wright Sr. Manager, Engineering-Federal, Lumen
-
New Army Acquisition Plan Cites Autonomy, Predictive Analytics
Officials outline how the Army Transformation Initiative signals a broader shift toward efficiency with tech and acquisition reform.
4m read -
DOE National Labs Launch New AI Tools for Operational Efficiency
The Energy Department's National Laboratories are using AI to increase operational efficiency and drive research efforts forward.
3m read -
Software Factories Accelerate Federal Modernization Outcomes
IT leaders from Nutanix and SAIC explain how software factories streamline tech development, modernize legacy systems and accelerate adoption of emerging technologies like AI.
34m watch -
Modernization Strategies to Enable Energy Innovation
Lawrence Berkeley National Lab and Maximus experts explore the modernization strategies driving digital transformation and operational resilience within the energy sector.
20m watch