Event Recap: Zero Trust: The Fundamentals

“You must operate under the presumption that your trusted partner’s network is already compromised,” said Darryn Graham with Software AG Government Solutions. Confluent’s Andrew Jacob added, “you can’t verify and protect what you can’t see.” With that said, government agencies are looking to Zero Trust cyber security to require all users, whether in or outside an agency’s network, to be authenticated, authorized, and continuously validated before getting or maintaining access to applications and data.
In this Zero Trust Virtual Conference, DGI convened an extensive set of experts who work both inside and externally for government agencies. The panel of speakers offered practical advice about how to move forward on Zero Trust initiatives. Topics included:
- The origins of Zero Trust and where it’s going
- The relevance of Zero Trust
- 7 tenets of Zero Trust
- Changing your mindset to ROI
- The complexity of the agency environment with public/multi-cloud, private cloud, hybrid cloud, and Edge
- A pragmatic approach to implementing Zero Trust
- The critical nature of understanding your data and its challenges
- Identity security architecture
- Zero Trust in the supply chain
- How to utilize APIs in Zero Trust strategies
Sponsored by: Fortinet Federal (Government Cyber Security), Software AG Government Solutions, Confluent, CyberArk, FORTRESS, and Red Hat.