Event Recap: Zero Trust Implementation

In the April 20th virtual conference, CyberArk’s Matt Tarr reminded attendees that “U.S. federal agencies must implement zero trust cybersecurity strategies based on Executive Order 14028” on improving the nation’s cybersecurity. He defined it as not only a “security framework with many functional parts,” but also a “paradigm shift.” Travis Rosiek at Rubrik explained it by addressing the questions, “when we want to build counter-measures to threats from cyber adversaries, what’s the playbook?…How are they going to be successful across a host of organizations that have varying levels of maturity?” Likewise, how does an institution manage security during a time of “unprecedented growth of unmanaged assets?” asked Joe Hamblin with Armis. With these critical questions and answers, DGI convened seven experts to speak in greater detail about where to start with Zero Trust and how to implement initiatives. Topics included:
- How security is strategic to success
- Building zero trust principles into your product
- Assessing risk with a zero trust framework
- Mapping zero trust requirements to identity security capabilities
- How to know if your data is an easy target
- Backup and cyber recovery
- Defining governance in the context of Zero Trust and why it’s important
- The CISA five pillar Zero Trust Maturity Model
- Closing the gap for managed and unmanaged devices
- Use cases and results from Fall 2022 Zero Trust Industry Day
Sponsors: Armis, CyberArk and Rubrik