VA Eyes Emerging Technology in Zero Trust Goals
The agency is looking to keep pace with the rate of technical change as a foundation of its enterprise cybersecurity strategy.

The Department of Veterans Affairs is looking to use emerging technologies in ways that also meet its broader goals of adopting zero trust security, which is driving a more unified approach to technology adoption across the agency.
This is a special concern for VA due to its exceptional scope of responsibility and size of the agency as well as the variable security concerns these produce. This drive to modernize an enterprise of VAโs breadth has spurred a corresponding focus on ensuring this process is managed in a way that protects critical data and information systems.
Recently, this has driven VA to focus on anticipating and meeting the rate of technological change rather than being purely reactive.
โThere are 170-plus VA hospitals out there that weโre constantly figuring out how to adjust policy for. So weโre constantly having to look into where health care is going, where technology is going, so that we can enact some change. Weโre staring pilots to collaborate with vendors so we can get some provisions in place, so we can see where both the health care and technology are going in the future in the hopes of improving health care for veterans,โ said Joseph Ronzio, deputy CTO at the Veterans Health Administration, at ATARCโs Zero Trust Summit Tuesday.
A key component of VAโs health care modernization has been using mobile devices and remote capacities that provide a new speed and access to care while presenting distinct security vulnerabilities. Reconciling these as part of a cohesive process has quickly become one of VAโs major IT security goals.
โWeโre constantly trying to push the envelope of how we get further out there and have more mobile devices for both patients and providers with more data coming from different edge devices,โ Ronzio said. โIt gets to be very difficult to govern because the type of data being provided could potentially be making a life-or-death decision for a patient. So how do you balance your security with your functionality in the long run, and then how do you afford to secure all those devices?โ
Meeting these goals will require a consolidation of security protocol, especially in providing a singular kind of evaluation for determining whether a device or piece of software adopted from the private sector is up to the broader security standards of an organization of VAโs size.
โWeโre not always getting a holistic look at security from a device or even from an application perspective. So we do have problems where different systems, especially within medical technologies, will go through a HIPAA audit and say, โWell weโre HIPAA-compliant.โ Well, thatโs great, but how about FISMA? And we have that split between what the government requires versus the general population. And I really think that we need more people to understand how truly everything needs to be secured,โ Ronzio said.
The general divide in security protocol between individual organizations, and between the government and private sector more broadly, is another challenge that VA technologists are attempting to address while implementing these new capacities. This has become a particular concern with the greater data and device dispersal that comes with a modernizing network.
โWe do have that problem where itโs split. Either youโre doing industry business or youโre doing government business. And if youโre in the government business, especially in health care, you have to have a high level of security,โ Ronzio said.
Ronzio has found that sustaining internal discussion between separate departments โ particularly those responsible for enterprise security and end-user operations โ has been a useful means of fostering a stronger culture of security that reconciles their separate priorities around unified zero trust standards.
โYou do need the end user to participate in that discussion and evaluate how valuable their data is and whatโs at risk,โ Ronzio said.
VA tech leadership ultimately ties these concerns directly back to applied data and interoperability, with the development of capacities like a modernized health record system providing both a greater continuity of care and greater information vulnerabilities that the agency seeks to address in tandem.
โIf youโre a veteran, when you first come into the service your first record might be done when youโre 16 or 17. And now youโre going to have that transition to the VA, weโre going to have to keep it for the rest of their life,โ Ronzio said. โEveryone wants to talk about data modernization, but I donโt think they have a grasp of how that reflects within the mission as much as I think they should.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
The Next AI Wave Requires Stronger Cyber Defenses, Data Management
IT officials warn of new vulnerabilities posed by AI as agencies continue to leverage the tech to boost operational efficiency.
5m read -
Federal CIOs Push for ROI-Focused Modernization to Advance Mission Goals
CIOs focus on return on investment, data governance and application modernization to drive mission outcomes as agencies adopt new tech tools.
4m read -
Trump Executive Order Boosts HBCUs Role in Building Federal Tech Workforce
The executive order empowers HBCUs to develop tech talent pipelines and expand access to federal workforce opportunities.
3m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
IHS Prepares to Deploy PATH EHR at Pilot Sites in 2026
IHS targets PATH EHR pilot in 2026, emphasizing governance, collaboration and interoperability as key pillars of the modernization strategy.
4m read -
Inside Oak Ridge National Labโs Pioneer Approach to AI
Energy Departmentโs Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
FEHRM CTO Targets Two-Year Cloud Migration for Federal EHR
Lance Scott touts new EHR tech advancements, including cloud migration, expanded data exchange and AI integration to improve care delivery.
4m read -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NISTโs Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
Trump Taps Maj. Gen. John Bartrum to Lead VHA
Nominated for VA's top health role, Bartrum brings over four decades of military and public service to the agency.
3m read