Zero Trust | GovernmentCIO Media & Research

Zero Trust

Many federal agencies are tackling identity, credential and access management solutions to help them in their new zero trust approach to security.
VA’s CDO Kshemendra Paul said cybersecurity and zero trust require effective data management.
The addition of a Portfolio Management Office advances zero trust efforts and interoperability within DOD.
CYBERCOM Executive Director Dave Frederick discussed his priorities and cyber concerns as the command gets more budgetary control.
Army CIO Dr. Raj Iyer said the department is 'at an inflection point' for IT modernization to meet future threats.
Identity and automation are supporting military personnel amid zero trust architecture implementation, but a skilled workforce is still needed.
CISA’s CDM lead wants agencies to harness data and application security within their cybersecurity strategies.
Zero trust interoperability is critical for DOD in order to implement JADC2.
Training a cyber-aware workforce can transform end users from potential vulnerabilities into security enablers.
The command is assessing new technologies to improve capabilities, automate processes and eliminate technical debt.
Join our senior researchers for updates on some of the top cyber initiatives at DISA and DOD.
Federal CIOs see the executive mandates as north stars for their internal strategies.
The Office of Justice Programs leveraged zero trust strategies as a pillar to modernize its grants management system.
Newly organized portfolio management office helps prioritize and align all zero trust efforts across DOD.
Modernized software development frameworks are leading to improved customer experience.
DISA cyber leaders will prioritize improving the user experience with cybersecurity to allow for seamless, secure network and data access.
The agency is tackling cybersecurity challenges head-on through its new prototype.
As agencies stand up zero trust strategies, federal and industry partners are working together on best practices
DOD leaders say you can't have JADC2 without zero trust and a "data-centric" approach to cyber.