Identity Meets Access: Zero Trust Controls Built for Federal SI Environments
This event qualifies for:
In today’s zero trust world, federal systems integrators (FSIs) operate in some of the most complex environments—distributed workforces, partner connectivity, subcontractors, and teams supporting multiple agencies with different requirements. That complexity makes it harder to ensure the right users have the right access to the right application without relying on broad network trust.
A modern approach pairs strong identity signals with application-level access enforcement and continuous verification after login. This helps SIs reduce over-privileged access, limit lateral movement, and improve auditability—while enabling secure collaboration across employees, subcontractors, and mission partners.
Learning Objectives:
- Outline the value and benefits of integrated, real-time enforcement of both identity and access control
- Define post-login risk in and how continuous verification helps to counter it
- Recognize how identity and security are evolving as AI becomes embedded across your organization—and as AI agents and other non-human identities emerge in your systems
- Review your organization’s audibility, data control, and third-party/supply chain exposure
Speaker Details
Chad Tetreault
AI Strategy & Governance, ZScaler
Sean Frazier
Officer, Okta
Mark Krzysko
FedInsider
Event Topic
Artificial Intelligence, Risk Management/Regulatory, Zero TrustRelevant Audiences
All Military, All State and Local Government, All Federal Government