Protecting a Mobile, Boundaryless IT Infrastructure

Protecting a Mobile, Boundaryless IT Infrastructure

 

The COVID-19 pandemic pushed federal agencies into new cyber territory with mass telework, accelerating the trend toward mobile infrastructure and edge computing, which in turn triggered new security challenges. In the age of bring-your-own-device (BYOD), federal leaders are managing identities and using zero trust to protect an increasingly mobile, boundaryless IT infrastructure.

  • Kenneth Bible, CISO, DHS
  • Jennifer Franks, Director, Information Technology & Cybersecurity, GAO
  • Sean Frazier, Federal CSO, Okta