The Cybersecurity and Infrastructure Security Agency (CISA) is considering turning its current Trusted Internet Connections (TIC) program office into an office that supports Federal agencies as they pursue requirements from CISA and the Office of Management and Budget (OMB) to migrate to zero trust security architectures. […]

The General Services Administration (GSA) was an early adopter of zero trust security architecture, and Chief Information Officer (CIO) David Shive said this week that the next step for the agency is to focus on application-level security. […]

cybersecurity

Thomas Santucci, director of the Data Center & Cloud Optimization Initiative program management office at the General Services Administration (GSA), is pointing Federal agencies to sources of expertise including CIO Council guidance and FedRAMP (Federal Risk and Authorization Management Program) as they navigate through requirements for the migration to zero trust security architectures. […]

Pentagon Military Defense DoD
Pentagon Military Defense DoD
cybersecurity

Successfully implementing a zero trust architecture can oftentimes be a challenge for organizations, especially when there is a lack of buy-in at the executive level. To help clear that kind of hurdle, Federal officials say the secret sauce is developing a zero trust business case. […]

As the Federal government continues to execute on fundamental shifts in network security strategies like the move to zero trust architectures, agency tech leaders are emphasizing the need to push back against the status quo of established technology thinking. […]

CX Customer experience -min
Pentagon Military Defense DoD

Ensuring a strong cyber posture against current and anticipated threats across the Department of Defense (DoD) has become an increasingly important priority as evidenced by the Pentagon’s release of the DoD Zero Trust Framework Strategy and Roadmap last month, an agency official said. […]

DoD Pentagon Military

The Department of Defense (DoD) today released its long-anticipated zero trust strategy and roadmap outlining how the agency plans to fully implement a department-wide zero trust cybersecurity framework by fiscal year (FY) 2027. “What is significant about the strategy is that the strategy makes zero trust tangible and achievable while recognizing a dynamic and frankly, […]

Cyber

Federal cybersecurity experts explained at a Nov. 8 ATARC event that the road to zero trust security is a long and often bumpy journey that their agencies at still learning to navigate, despite some being in the game for several years now. […]

DoD

The Defense Information Systems Agency (DISA) is well prepared to meet the Department of Defense’s (DoD) 2027 zero trust architecture goal, officials said on Nov. 7 at a DISA press conference. […]

Pentagon Military Defense DoD
healthcare cyber-min
DoD Pentagon Military

The Department of Defense (DoD) plans to release in the coming days a detailed strategy for its ambitious department-wide zero trust security strategy, said Randy Resnick, director of Zero Trust Portfolio Management at DoD, during FCW’s CDM Summit event on Nov. 2. […]

Pentagon Military Defense DoD

The Defense Information Systems Agency (DISA) is moving closer to completing its Thunderdome project – DISA’s zero trust security model – by the target date of January 2023, but the agency still faces the challenge of scaling it across Defense Department (DoD) networks, an agency official said. […]

CISA

Federal agencies are engaged in “a tremendous amount of work” to meet requirements to move to zero trust security architecture as laid out in President Biden’s cybersecurity executive order issued last year, even as some agencies are struggling with initial steps to begin that transition, a top Cybersecurity and Infrastructure Security Agency (CISA) official said Wednesday. […]

Cyber

The term zero trust is often used as a buzzword, but Department of Veterans Affairs (VA) Chief Information Officer (CIO) Kurt DelBene said a successful organization will prioritize security above all else, and have zero trust baked into its workforce culture. […]

A new survey of several hundred cybersecurity professionals reveals that nearly two-thirds of their organizations are considering alternatives to virtual private network (VPN) infrastructure for providing remote access because of the technology’s vulnerability to sophisticated cyber attacks. At the same time, the vast majority of those organizations are moving to adopt zero trust security architectures to improve security. […]

Pentagon Military Defense DoD

The Department of Defense’s (DoD) new zero trust strategy outlines 90 capabilities that will help the department bring to bear its “targeted” zero trust framework across the entire department, said DoD Chief Information Officer (CIO) John Sherman. […]

The Pentagon is a very large building that houses a lot of the authorities for the U.S. Military. It's big. This photo doesn't do it justice, but they're kinda rightly concerned about people flying drones around there.
General Services Administration GSA

Lawrence Hale, who recently took over as Acting Deputy Assistant Commissioner for Category Management, Office of Information Technology Category at the General Services Administration’s (GSA) Federal Acquisition Service, explained today that his office’s fiscal year 2023 priorities focus on helping Federal agencies work toward easier cloud service adoption and continued progress in zero trust security migration.  […]

Randy Resnick, Director of the Zero Trust Portfolio Management Office within the Defense Department’s (DoD) CIO office, laid out the broad strokes of DoD’s zero trust security plans during a presentation on August 23 at the 930GOV event organized by Digital Government Institute. […]

DISA

As Federal agencies continue to build out zero trust architectures, they are increasingly focused on a critical component of any zero trust strategy: identity, credential, and access management (ICAM) solutions. […]

cybersecurity

The Federal government has come a long way with implementing zero trust security architectures, but Federal chief information officers (CIOs) and chief information security officers (CISOs) hope the future of zero trust is “instinctive,” and something that is naturally baked into agencies’ programming. […]

Categories