Navigating Zero Trust for Cybersecurity
Security leaders are leveraging zero trust’s core principle of “never trust, always verify” to protect their organizations. Cybersecurity requires continuous authentication, micro-segmentation and data-centric security as part of zero-trust implementation.
Leaders from the World Bank Group and Lumen explain how they are building zero-trust architectures, addressing common implementation roadblocks and adapting to evolving cyber threats.
Learn more about:
- The evolution of World Bank Group’s zero trust program.
- How organizations are approaching change management to guide users through zero trust adoption.
- The metrics and indicators security leaders are using to measure success and inform next steps in the journey.
-
Sarah Sybert Managing Editor, GovCIO Media & Research -
Remy Faures CISO, World Bank Group -
Hunter Wright Sr. Manager, Engineering-Federal, Lumen
-
The Tortoise, Not the Hare: Why Phased IT Modernization Wins
Federal technology leaders said phased modernization, data migration and AI tools can help agencies reduce risks tied to legacy IT.
3m read -
NIH, State Leaders Call for Smarter Federal Data Sharing
Officials said modernizing data governance and reducing siloed systems can improve efficiency, research collaboration and crisis response.
4m read -
CROCS Turns OT Cyber Policy Into Action
Air Force tracks a 100-point OT cyber plan, convenes 100 experts monthly and pushes bases to rehearse operations through cyber disruptions.
13m watch -
Deploying Agentic AI Across Government
Learn how federal agencies are are governing, securing and scaling agentic AI tools.
24m watch Partner Content