The need to define budgets years before spending a single dime creates a challenge at most Defense organizations when it comes to ensuring appropriations align with mission demands. Our ebook looks at potential policy and technology tactics.
Identity as a service is where agencies and private sector companies are heading to manage cyber in today’s mobile, agile world. Okta’s Sean Frazier explains why during our Zero Trust Cyber Exchange.
To get beyond zero trust’s identity focus, turn to the guidance and existing programs the government has already established — like NIST’s SP 800-207 and GSA’s FedRAMP, suggests RSA’s Steve Schmalz at the Zero Trust Cyber Exchange.
Bad actors are after data, which is why it makes sense to focus on understanding where data resides and where is travels, explains VMware’s Andrew Osborn during the Zero Trust Cyber Exchange.
Although adoption of zero trust is the biggest cyber shift forward in decades, it’s also a mindset challenge because both government and industry are now on journey without end, explains Intel’s Cameron Chehreh at the Zero Trust Cyber Exchange.
Given the way agencies have woven together disparate systems, it’s easy for there to be elements that lack visibility. That’s where zero trust work must begin, says Infoblox’s Chris Usserman during the Zero Trust Cyber Exchange.
The federal zero trust strategy is clear: Implementing the new architecture is not solely the job of CISOs and sysadmins. It will require a cross-discipline team, explains Tim Jones of Forescout Technologies at the Zero Trust Cyber Exchange.
The government is approaching zero trust using an easy-to-understand pillar model that helps everyone in an organization, not just security teams, understand their role in the new security architecture. Dell Technologies’ Dan Carroll offers an easy real-world example to use during the Zero Trust Cyber Exchange.
Every organization wants to build faster, more flexible, more scalable and more secure systems. How do you get there? Nick Miller shares the four guiding principles that AWS uses to help organizations on that journey during the Zero Trust Cyber Exchange.
Agencies need to think about how best to secure users, data and devices when using collaboration platforms, explains AvePoint’s Jay Leask during our Zero Trust Cyber Exchange. And the pillar? It’s called ‘workspace.’
Everybody, it seems, is talking about digital transformation. But what exactly is digital transformation?
FEDtalk is celebrating Pride Month with a discussion on LGBTQ+ inclusivity in government.
You’ll learn about the early challenges of starting CHC, the patients it’s helped and how it fits into the larger effort to improve U.S. health care.
The sea services want to move to a software-defined environment that will let them deliver capabilities at the edge as needed. To do that, they intend to move to a model where hardware is disposable. Learn how the Navy has evolved its network vision.
With zero trust, the network itself can actually tell you, via IP addresses, how many users you have and what applications they’re using. That information can be collected passively, and it’s where agencies need to start to best secure their networks, because insider threat should be their primary concern.