Strategies for Implementing and Operating a Zero Trust Architecture



The sophistication and volume of cyber-attacks that government agencies face on a daily basis requires more than just technology to combat it. Zero Trust offers a holistic strategy and framework that is not tied to a single decision of technology, but rather enables IT and agency leaders to promote and support enterprise wide shifts in where and how it provides access to data and/or systems and applications. As agencies consider a zero trust model, where should they begin beyond the security team?


During this digital webcast, we’ll explore the cultural foundations of Zero Trust and dive into how to assess the risks and maturity of your current cyber posture. You will leave with practical takeaways and best practices for implementing the following pillars of a zero trust architecture:

  • Data Discovery and Inventory - How to gain visibility into all the endpoints on your network
  • Data Classification - How to build a system that systematically tracks, monitors, protects, and accesses your most critical information
  • Data Protection - Once discovered, inventoried and classified, how to monitor and protect data based on it’s risk and value
  • User Identity and Privilege Access - How to provide the right access to the right people at the right time

Relevant Government Agencies

Intelligence Agencies, DOD & Military, Other Federal Agencies, Federal Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Oct 14, 2020, 11:00am - 12:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Government Executive Media Group
World Wide Technology | Forcepoint


Contact Event Organizer



Return to search results