DGI: Why Zero Trust Starts with Identity Security

October 31, 2022

Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process. This virtual workshop will focus on the fundamentals of Zero Trust highlighting the ‘how to’ and lessons learned to date.

Previous Flipbook
The Problem with Solely Standing Access
The Problem with Solely Standing Access

Just-in-Time (JIT) access helps enforce least privilege to a specific resource or timeframe, mitigating the...

Next eBook
CISO Handbook- Why Zero Trust Starts with Identity Security
CISO Handbook- Why Zero Trust Starts with Identity Security

Take a deep dive into efforts at the Army Software Factory, CISA and DISA— particularly at a time that agen...