Strategies for Implementing and Operating a Zero Trust Architecture
The sophistication and volume of cyber-attacks that government agencies face on a daily basis requires more than just technology to combat it. Zero Trust offers a holistic strategy and framework that is not tied to a single decision of technology, but rather enables IT and agency leaders to promote and support enterprise wide shifts in where and how it provides access to data and/or systems and applications. As agencies consider a zero trust model, where should they begin beyond the security team?
During this digital webcast, we’ll explore the cultural foundations of Zero Trust and dive into how to assess the risks and maturity of your current cyber posture. You will leave with practical takeaways and best practices for implementing the following pillars of a zero trust architecture:
- Data Discovery and Inventory - How to gain visibility into all the endpoints on your network
- Data Classification - How to build a system that systematically tracks, monitors, protects, and accesses your most critical information
- Data Protection - Once discovered, inventoried and classified, how to monitor and protect data based on it’s risk and value
- User Identity and Privilege Access - How to provide the right access to the right people at the right time
Relevant Government Agencies
Intelligence Agencies, DOD & Military, Other Federal Agencies, Federal Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Wed, Oct 14, 2020, 11:00am - 12:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
Government Executive Media Group
World Wide Technology | Forcepoint