JIT PAM can ensure that identities only have the appropriate privileges when necessary, and for the least time necessary.
The use of DevOps or agile development has grown by leaps and bounds over the last few years.
John Davis, the vice president of public sector for Palo Alto Networks, said those key concepts that will move agencies toward a zero trust approach include protecting from the inside out versus the outside in, which has been the case for much of the past three decades.
On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
Dave York, the senior vice president of U.S. public sector for Genesys, said agencies can improve how they deliver services to citizens by taking a omni-channel approach to digital modernization.
Rick Howard, the chief security officer for Palo Alto Networks, said the wide-spread acceptance of using cloud services for operational requirements is driving opportunity to modernize.
The authority to operate (ATO) process–the bane of many CIOs and developers existence in the federal sector. It is one of those necessary evils of federal technology. But it’s such a problem that agencies over…
NSA contracted with Palo Alto Networks to put a Zero Trust architecture in place to protect all its sensitive medical data.
Juliana Vida, the chief technical advisor public sector for Splunk, said there is hope and there is opportunity, both of which can be found in the data.
The ultimate objective is to eliminate the need to work on multiple devices. Using the cloud, the data is all in one place and easier to access, and easier to share.