Play
00:00
Play
Seek 10 seconds backwards
Seek 10 seconds forward
00:00 / 00:00
Mute
Settings
Picture in picture
Fullscreen
Zero Trust Webinar - Transforming Cybersecurity - 20230119 - final
From George Alves January 19th, 2023
383 plays
383
1 comments
1
You unliked the media.
Related Media
From Robert Skertic August 16th, 2019 |
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. Programs implementing ZT need awareness of three logical components (described in National Institute of Standards and Technology (NIST) SP 800-207): the Policy Engine (PE), Policy Administrator (PA), and Policy Enforcement Points (PEP). The PE fuses information sources like: network and endpoint configurations; data tagging; user analytics; access control; and policy orchestration. The PE makes risk-based access decisions based on device, asset status, and environmental factors. It determines when access becomes an unacceptable risk. NIST SP 800-207 "Zero Trust Architecture" describes the PE as "the brain and the PE's trust algorithm as its primary thought process."
A robust ZT implementation can lead to better user experience and improved cyberthreat defense. Understanding the PEP is critical for enabling automation and orchestration in ZT implementations. This session helps program offices implement their ZT strategy, starting with the PEP. It establishes a framework for ZT implementation and discusses additional PEP training/resources. Our ultimate ZT goals are mission assurance and dynamic network maneuver.
Join David Voelker to better understand the DoD’s zero trust strategy and successful implementation of a critical enabling ZT capability
- Tags
- Department / Directorate
- Media Deployment
- iCatalog Course Area
- iCatalog Course ID
- DAU Web Event Series
- Appears In
Loading