Zero Trust in a Multi-Domain Environment

Presented by

George Kamis, Forcepoint Global Governments & Critical Infrastructure

About this talk

"Zero Trust is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated”, according to NIST Zero Trust Architecture (NIST Special Publication 800-207). However, how can that be achieved? Join Forcepoint Global Governments & Critical Infrastructure CTO, George Kamis, for a pragmatic approach to Zero Trust in a multi-domain environment, and gain the following: Knowledge on Verifying Explicitly – using multiple attributes (Dynamic and static) to derive confidence levels for contextual access decisions to resources. Detailed blueprints on how to utilize identity, but implement technology that is agnostic to A&A - providing proper access and transfers for multi-domains, remotely, from a single device. Knowledge on how to implement a Zero Trust framework built for continuous monitoring for DCO Enclaves and Cross Enclave collaboration.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (66)
Subscribers (2255)
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions. Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.