As they transition, Federal agencies must continue to defend against threats on their existing infrastructure while extending that protection to the exploding number of remote endpoints connecting to their networks.
Guy Cavallo, the deputy CIO at SBA, said the work under the CDM and TIC programs over the last two years is opening the door to pilot zero trust concepts and move away from the “hub and spoke” model for its network.
This week on Federal Tech Talk, Stephen Kovac, vice president of Global Government and Compliance at Zscaler, joins host John Gilroy to discuss the pros and cons of secured remote access.
North Dakota reported smooth a telework transition, recommending compliance standardization and reliance on aggressive IAM protocols with MFA and zero trust perquisites.
With this ever burgeoning regulatory environment, achieving and maintaining cybersecurity compliance is a complex process.
The federal government is getting closer to rolling out its Trusted Internet Connection 3.0 policy, and the Cybersecurity and Infrastructure Security Agency is laying the groundwork for agencies to begin using the program.
NIST computer scientist Scott Rose said the publication is meant to help generate a “conceptual framework” for agencies and cybersecurity experts to apply zero trust principles within their enterprise.
AppGate Federal Group President Greg Touhill joined host John Gilroy on this week’s Federal Tech Talk to discuss Zero Trust, cybersecurity and how to reduce the attack surface for federal information technology.
John Davis, the vice president of public sector for Palo Alto Networks, said those key concepts that will move agencies toward a zero trust approach include protecting from the inside out versus the outside in, which has been the case for much of the past three decades.
Neha Anand, group product manager at Okta, offers four predictions for technology trends in the government sector in the new year.