Fireside Chat: Aligning ICAM, the Executive Order & Zero Trust


This event qualifies for 1 CPEs


In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term "Zero Trust" from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify, and only allow access when contextual parameters are met. 


Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must protect identities to stop adversaries from getting into our networks, moving laterally, escalating privileges, and ultimately accessing and manipulating our data. Leveraging ICAM and robust identity security strategies enables agencies to move from a network-based approach to a data-centric approach to defending systems. 


Join government security experts for a panel discussion to understand:  

  • Why Privileged Access Management (PAM) is essential to major DoD initiatives like ICAM, Thunderdome, and Zero Trust
  • How ICAM supports the Executive Order
  • The Defense Department's outlook on data-centric security and defending agency systems 
  • The path to secure modernization using Least Privilege

Speaker and Presenter Information

Josh Brodbent
RVP, Public Sector Solutions Engineering
BeyondTrust

 

MG Joe Brendler
US Army (Ret.)
Deep Water Point

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register


Event Type
On-Demand Webcast


This event has no exhibitor/sponsor opportunities


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Organizer
BeyondTrust Government Team at Carahsoft


Contact Event Organizer



Return to search results