The Future of Implementing Zero Trust
Cybersecurity threats are ongoing against government assets and networks, while recent threats have highlighted the challenges of ensuring effective cyber defenses. Enacting zero-trust architectures is a goal of agencies across government to ensure better cybersecurity.
Learn:
- How CISA is aligning its goals with the White House’s.
- The ways that the Navy is connecting CJADC2 with zero-trust goals.
- The Pentagon’s next steps in ZTA implementation.
- CISA’s pillars of zero trust maturity.
Table of Contents:
- Pentagon Eyes Next Step in Zero Trust Implementation
- Zero Trust Synonymous with CJADC2 Operations, Navy Leaders Say
- The Four Pillars of CISA’s Zero Trust Maturity Model Version 2.0
- Deploy Zero Trust Architecture to Secure Systems
- CISA Updates Zero Trust Maturity Model to Align with White House Directives
-
David McKeown Senior Information Security Officer and Deputy Chief Information Officer for Cybersecurity, Department of Defense -
Lt. Gen. Maria Barrett Commanding General of Cyber Command, U.S. Army -
Randy Resnick Director, Zero Trust Portfolio Management Office, DOD -
John Sherman CIO, DOD -
John Simms Senior Technical Advisor, TIC, CISA -
Scott St. Pierre Director Enterprise Networks and Cybersecurity (OPNAC N2N6D), US Navy
-
IT Modernization Driving AI Efficiency
Federal agencies are under pressure to modernize IT systems as AI-driven missions demand faster, more secure and resilient infrastructure.
20m read -
How Tech Can Bridge Gaps in Rural Healthcare Data Struggles
Prescription price transparency and nationwide data sharing are among the areas in which officials say technology can reduce costs.
4m read -
DHS Secretary Touts New Contract Review Policy
DHS Secretary Markwayne Mullin said scrapping a $100K contract approval rule will clear FEMA backlogs and speed disaster response.
3m read -
Iran Cyber Campaign Targets Critical Infrastructure’s Weakest Links
Recent guidance to secure certain critical infrastructure assets turns attention to gaps in OT systems and cloud-connected environments.
4m read