The Future of Implementing Zero Trust
Cybersecurity threats are ongoing against government assets and networks, while recent threats have highlighted the challenges of ensuring effective cyber defenses. Enacting zero-trust architectures is a goal of agencies across government to ensure better cybersecurity.
Learn:
- How CISA is aligning its goals with the White House’s.
- The ways that the Navy is connecting CJADC2 with zero-trust goals.
- The Pentagon’s next steps in ZTA implementation.
- CISA’s pillars of zero trust maturity.
Table of Contents:
- Pentagon Eyes Next Step in Zero Trust Implementation
- Zero Trust Synonymous with CJADC2 Operations, Navy Leaders Say
- The Four Pillars of CISA’s Zero Trust Maturity Model Version 2.0
- Deploy Zero Trust Architecture to Secure Systems
- CISA Updates Zero Trust Maturity Model to Align with White House Directives
Featuring
-
David McKeown Senior Information Security Officer and Deputy Chief Information Officer for Cybersecurity, Department of Defense
-
Lt. Gen. Maria Barrett Commanding General of Cyber Command, U.S. Army
-
Randy Resnick Director, Zero Trust Portfolio Management Office, DOD
-
John Sherman CIO, DOD
-
John Simms Senior Technical Advisor, TIC, CISA
-
Scott St. Pierre Director Enterprise Networks and Cybersecurity (OPNAC N2N6D), US Navy
Sponsor
Related Content
-
IRS Tax Filing Pilot Part of Digital-First Customer Experience Plan
Many taxpayers increasingly expect flexible, easy and self-directed digital interactions, agency leaders said.
5m read -
Federal Agencies Make the Case for Quantum
Amid development of emerging technologies like AI and machine learning, leaders see promise in quantum computing.
6m read -
Cyber Incident Reporting Regulation Takes Shape
An upcoming CISA rule aims to harmonize cyber incident reporting requirements for critical infrastructure entities.
5m read -
Connectivity Drives Future of Defense
The Defense Department is strategizing new operating concepts ahead of future joint force operations.
8m read