A panel of federal and industry experts describe each of their approaches to achieving a zero trust architecture to improve the security of systems and data.