Agencies are aggressively adopting Zero Trust principles. But, while agencies strive to meet requirements, what roadblocks do they face? Which of OMB’s zero trust security pillars (identity, device, network, application, and data) are taking precedence, and which are falling behind? MeriTalk and Merlin Cyber surveyed more than 150 Federal cybersecurity executives to explore momentum, priorities, and challenges around the evolution to zero trust.
DoD agencies are significantly more likely than civilian agencies to see the Application pillar as critical to achieving zero trust. But why is that, and does the Data pillar fit in agency priorities? In the final piece of a four-part webinar series, MeriTalk will sit down with IT industry and public sector experts to specifically address the Application and Data pillars of CISA’s Zero Trust Maturity Model. We’ll discuss optimal maturity, progress to date with Application and Data implementation, and expected challenges in inventory management, access authorization, governance capability, and automation and orchestration capability.
Join us, for answers to:
- Where do Application and Data rank in terms of agencies’ zero trust priorities?
- Which of CISA’s Application and Data goals will be the most challenging to achieve?
- What specific challenges do agencies face while implementing these pillars?
- Where do agencies need support around the Application and Data pillars to successfully implement zero trust?
- What best practices are we seeing as agencies leverage M-22-01 to improve application security?
All fields marked with an asterisk (*) are required.