Wayne LeRiche, the federal civilian field chief technology officer and solutions architect for Palo Alto Networks Federal, said secure access service edge (SASE) sets a framework for agencies to get more easily implement a zero trust architecture.
Zero trust is driving the security conversation today across both the public and private sectors. Within government, it’s a top priority as evidenced by the directives, mandates and policies that have been issued by the…
Herb Kelsey, the Project Fort Zero Team Leader at Dell Technologies, said agencies have the opportunity to focus on the policy and process side and not the technology piece of the zero trust architecture.
As zero trust increasingly becomes the norm, especially in fed, not only can we expect to see more resilience, but a greater ROI in cybersecurity overall. We just have to continue to make progress on our zero trust plans with speed and transparency at the forefront of our collective approach.
Randy Resnick is the director of Zero Trust Architecture Program Management Office in the DoD’s CIO’s office. A team of 17 to 18 people will analyze the zero trust plans submitted by 43 services and agencies.
Traditional security controls are insufficient in protecting against major security breaches. They tend to be reactive, static, noncontextualized around threats and are often based on compliance requirements and information technology practices. As a result, traditional security controls are not responsive enough to anticipate, evolve and adapt to threat actors’ behaviors and activities.
In the realm of federal cybersecurity, change is both inevitable and necessary. The urgency of President Biden's 2021 Executive Order to implement a zero trust architecture by September 2024 has set the stage for a pivotal transformation. Yet, as the deadline draws near, it's apparent that while the directive's intent is clear, the path to its realization is fraught with complexity and challenges.
As the government continues to modernize, zero trust remains a top priority. Agencies can leverage this potential influx of funding to make strategic investments that achieve zero trust goals.
Zero-trust architecture has been top-of-mind for the federal government, especially as we approach the one-year countdown for the White House’s zero-trust memorandum deadline.
Lt. Gen. Robert Skinner, DISA’s director and commander of the Joint Force Headquarters-Department of Defense Information Network (JTF-DoDIN), said the agency is undertaking three separate tests of tools to better protect internet boundaries.
Col. Michael Smith, the director of the Army’s functional management office for zero trust and director of the unified network task force, said an ongoing gap analysis will look at weapons systems and control systems to see where zero trust capabilities can fit in.
The IRS has a detailed plan for achieving a state of zero trust on its information technology networks, which is something all agencies are under obligation to do for cybersecurity.
Federal CISO Chris DeRusha says using weak forms of identity authentication is like "driving without seatbelts."
During this exclusive webinar, top federal technology executives and industry experts will discuss what they've learned around zero trust strategy and the future of zero trust in government.