Join experts from Cybersecurity and Infrastructure Security Agency (CISA), OMB, NIST, and Mandiant as they share the steps to implement Zero Trust Architecture to comply with the cyber security Executive Order.
The Cyber Security Executive Order, driven by the escalation of zero-day attacks from Solar Winds to Colonial Pipeline to Microsoft, aims to modernize U.S. government security defenses. This is a turning point for federal agencies, providing clear guidance toward ensuring that government data and systems are protected.
It’s clear that now is the time for federal agencies—and even state and local institutions to act. Despite differing stages of maturity with Zero Trust and the fact that many government agencies are facing IT security skills shortages, implementation is achievable.
Join our panel of Zero Trust experts as they share the key steps toward implementing a ZTA —from the implementation of multi-factor authentication all the way to network micro segmentation and automated threat detection. You will learn:
- The building blocks of a ZTA and how does it satisfy the Executive Order Requirements
- How to leverage existing security practices and solutions to build into your ZTA
- How to uncover the unique compliance and security requirements of 3rd party solutions
- How to create a standard playbook for responding to cyber incidents