Fireside Chat: Aligning ICAM, the Executive Order & Zero Trust
This event qualifies for 1 CPEs
In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term "Zero Trust" from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify, and only allow access when contextual parameters are met.
Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must protect identities to stop adversaries from getting into our networks, moving laterally, escalating privileges, and ultimately accessing and manipulating our data. Leveraging ICAM and robust identity security strategies enables agencies to move from a network-based approach to a data-centric approach to defending systems.
Join government security experts for a panel discussion to understand:
- Why Privileged Access Management (PAM) is essential to major DoD initiatives like ICAM, Thunderdome, and Zero Trust
- How ICAM supports the Executive Order
- The Defense Department's outlook on data-centric security and defending agency systems
- The path to secure modernization using Least Privilege
Speaker and Presenter Information
Josh Brodbent
RVP, Public Sector Solutions Engineering
BeyondTrust
MG Joe Brendler
US Army (Ret.)
Deep Water Point
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
BeyondTrust Government Team at Carahsoft