Employing a Zero Trust Security Model

Presented by

Gerald J. Caron III, HHS ; Steven Hernandez, Department of Education; Guy Crumpley, Forcepoint G2CI

About this talk

Zero Trust Security is a clear priority for the federal government -- spotlighted in the recent Executive Order on Improving the Nation’s Cybersecurity, and stressed by federal CISO Chris DeRusha as the desired end state for every agency. Yet Zero Trust is a strategy, not a tool or product -- and the path for moving from concept to actual implementation is not always clear. This FCW webcast clarifies some of those building blocks and best practices, drawing on the experiences of agencies that were early to embrace Zero Trust and the shared resources being developed by NIST, CISA and others. Register today to learn more about: Current guidance and governmentwide requirements Starting with narrow test cases vs. tackling Zero Trust at enterprise scale The data and analytics required to effectively embrace Zero Trust How existing systems can be leveraged for Zero Trust efforts

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (70)
Subscribers (2047)
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions. Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.