Implementing Zero Trust in Government Agencies: How to Think Beyond Identity

Presented by

Victor Martinez, Senior Cyber Engineer, Forcepoint

About this talk

As enterprise networks change to support remote users and cloud-based assets that are not located within an enterprise-owned network boundary, security has forever changed. Zero trust focuses on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. In 2020, the definitions and guidance for what zero trust is and how it should be implemented have been formally laid out in the pending NIST 800-207 publication. According to this guidance, users and their identities play a pivotal role in a zero trust framework, and organizations must ensure on a continuous basis that only authenticated and authorized users and devices can access applications and data. However, identity is just the beginning when designing a zero trust environment. This session will review the latest research on agency adoption of Zero trust, discuss the 7 basic tenets of a Zero Trust architecture that NIST has identified, and cover why evaluating behavioral attributes is also important to consider as you continually re-evaluate trust throughout the users interaction with your data.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (66)
Subscribers (2255)
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions. Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.