Using the Tools at Hand to Get to Zero Trust

Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches.

 

The Department of Homeland Security observed in its Zero Trust Implementation Strategy that agencies “can expect audits and budgets to hinge on questions of whether and how [they’ve] implemented zero trust for years to come.”

 

In the DHS strategy, leveraging current tools in a creative way can help meet zero trust implementation goals and fundamentally reduce risk. This requires understanding what tools are already available, their features and functionalities, how widely deployed they are, and how different tools can be integrated to achieve priorities such as adopting identity-driven access, incorporating the principle of least privilege, and reducing an agency’s threat surface.

 

Learning Objectives:

  • Review the goals and objectives a zero trust architecture aims to achieve, such as both streamlining and strengthening cybersecurity protections
  • Identify specific tools being used at your agency and how they can help reach milestones on the zero trust journey
  • Delineate challenges and obstacles agencies may have in common (e.g., legacy technology and architecture, budget constraints) and ways to address them

Speaker Details

Bob Costello, Chief Information Officer, CISA

Bob Costello
Chief Information Officer,
CISA

 

Jonathan Feibus, CISO, NRC

Jonathan Feibus
Chief Information Security Officer,
NRC

 

Christopher Johnson, Acting CTO, NGA

Christopher Johnson
Acting CTO,
NGA

 

Mark Modisette, Zero Trust Technologist, Optiv + Clearshark

Mark Modisette
Zero Trust Technologist,
Optiv + Clearshark

 

Wayne LeRiche, Field CTO, Federal Civilian, Palo Alto Networks

Wayne LeRiche
Field CTO, Federal Civilian,
Palo Alto Networks

 

John Breeden, Moderator & Contributing Editor, FedInsider

John Breeden
Contributing Editor,
FedInsider

Event Topic

Management, Security, Zero Trust

Relevant Audiences

All State and Local Government, All Federal Government, Army, National Guard, Air Force, Coast Guard, Navy, City Government, County Government, Municipalities, State Government, Central Intelligence Agency, Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Homeland Security, Department of Housing and Urban Development, Department of Interior, Department of Justice, Department of Labor, Department of State, Department of Transportation, Department of the Treasury, Environmental Protection Agency, Equal Employment Opportunity Commission, Federal Aviation Administration, Federal Communications Commission, Food and Drug Administration, Federal Emergency Management Agency, General Services Administration, Government Accountability Office, National Aeronautics and Space Administration, National Institute of Health, National Security Agency, Social Security Administration, U.S. Agency of International Development, U.S. Census Bureau, U.S. Office of Personnel Management, U.S. Postal Service, Veterans Affairs

Other Agency

Office of the President (includes OMB), Other Federal Agencies, Judicial Branch Agencies, Foreign Governments/Agencies
Using the Tools at Hand to Get to Zero Trust
Event Type
Virtual / Online
Event Subtype
Webinar / Webcast
When
Wed, May 01, 2024 | 2:00 pm - 3:30 pm ET
Registration Cost
Complimentary
Website
Click here to view event website
Sponsors
Optiv + ClearShark