On Demand Webinar

Making Sense of Zero Trust: Perspectives from Inside and Outside Government Organizations

Making Sense of Zero Trust: Perspectives from Inside and Outside Government Organizations

The overnight shift to a digital world driven by a worldwide pandemic put the spotlight on identity security, according to recent research from the Identity Defined Security Alliance. Organizations in both the public and private sector felt an unprecedented sense of urgency around protecting users, devices, and applications outside of the traditional network perimeter. The buzz around Zero Trust which had been building for the last several years became even more intense with the recent Presidential Executive Order mandating a Zero Trust approach to security for government agencies.

Adopting Zero Trust, whether driven by a government mandate, or the shift to a modern security strategy, can be a daunting effort. In this event you’ll learn from leading organizations and agencies who are well down the path of implementing Zero Trust strategies as they share the challenges and lessons learned during their journey. You’ll also hear from the architects and creators of the leading reference architectures and resources available to guide organizations on their path to Zero Trust, including NIST SP 800-207Department of Defense Zero Trust Reference Architecture and The Path to Zero Trust starts with Identity.

Agenda

Welcome and Introductions – Julie Smith, Executive Director, Identity Defined Security Alliance

Zero Trust Reference Architectures and Resources, moderated by Jerry Chapman – IDSA Zero Trust TWG subcommittee team member, Engineering Fellow – IAM, Optiv and co-author of Zero Trust Security, An Enterprise Guide

Deploying Zero Trust in Public and Private Sector Organizations, moderated by Lisa Plaggemier, Executive Director, National Cyber Security Alliance:

 

Note: The IDSA is an approved (ISC)2 CPE Submitter Partner. To receive CPE credits, submit the viewing certificate to (ISC)2 or submit your information. Make sure to check out our other identity-centric security webinars from leading identity and security experts.

Related Webinars

On Demand Webinar

On Demand Webinar

MFA Fatigue, SS7 Exploits, and Attack Kits: Future-proofing Your MFA

Member Sponsor

On Demand Webinar

On Demand Webinar

How to Manage Disconnected Applications with Your Identity Program

Member Sponsor

On Demand Webinar

On Demand Webinar

It All Comes Back to Access: How to Establish Cloud Identity Security in 2024

Member Sponsor
Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.