Zero Trust Transforming Cybersecurity – How Do You Know If A System Is Trustworthy?
From Christi Whallon February 21st, 2025
Related Media
From Robert Skertic August 16th, 2019 |
Zero Trust (ZT) transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust.
Come join Mr. Chance Younkin, who will give an overview of a pilot to know if a system is trustworthy. By linking consequences, threats, and vulnerabilities and mapping them to mission risk, Continuous Risk Analysis Infrastructure for Discovery and Reduction (CRAIDR) will significantly reduce the effort to prioritize, communicate, and mitigate risk.
The CRAIDR approach enables defenders to focus on independent analyses and then link these results to the mission. Through 4 kinds of analysis—Consequence, Threat, Vulnerability, and Risk, there are multiple approaches to suit the needs of many missions. CRAIDR uniquely blends traditionally effective activities with innovative mission focused analyses that unite the equities of executives, managers, cyber practitioners, and system developers.
- Tags
- Department / Directorate
- Media Deployment
- iCatalog Course Area
- iCatalog Course ID
- DAU Web Event Series
- Appears In