03.07.2023 - By Career Communications Group, Inc
As we transition from a remote to a fully mobile, hybrid workforce, organizations need to re-evaluate their approach to securing their people and data. Perimeter defense is no longer sufficient for achieving cyber resiliency and securing our information enterprise that spans geographic borders, interfaces and external partners, and support to millions of authorized users. The "never trust, always verify" mindset requires organizations to take responsibility for securing devices, applications, assets, and services. For an effective Zero Trust security model implementation, organization should answer the following:
What do you trust: verify explicitly, authenticate, and authorize (enterprise network)
Who do you trust: least privilege access (applications, devices, services, users)
How do you trust: end to end encryption (technology)
Enabling Objectives:
Zero Trust Cultural Adoption (mindset that guides the design, development, integration and deployment of information technology across the Zero Trust Ecosystem).
Cybersecurity information systems Secured & Defended (cybersecurity practices to incorporate and operationalize Zero Trust to achieve enterprise resilience).
Technology Acceleration (zero trust-based technologies deployed at a pace equal to industry advancements to remain ahead of changing threat environments).
Zero Trust Enablement (policy, programming, planning, funding, execution).
Speakers:
Robbin Johnson, Senior Information System Security Engineer, National Security Agency
Jerri Sanders, Quality Assurance and Risk Manager
Stephen Yirenki, CEO, Terp Techs, LLC
Col. Elizabeth Casely, Director, I Corps Communications (G6)