Zero trust isn’t a new concept, although it’s certainly gained popularity recently after numerous high-profile security incidents and the Executive Order on cybersecurity issued by the White House this past May. While there’s no shortage of theoretical and abstract information available on zero trust, actionable recommendations have been hard to come by. The zero trust architecture provides guidance on protecting resources, the general deployment models are theoretical and non-specific. This lack of practical guidance has created challenges within organizations that desire to move to a zero-trust architecture but are stalled on issues of scalability, implementation inconsistencies, and lack of overall program buy-in.

With the implementation plans well underway, our panelists will discuss and evaluate current zero trust architecture utilization and opportunities for sharing of best practices. This virtual briefing will provide pragmatic suggestions to address these challenges using tools and services available today that can get an organization on a path to a zero-trust future.

ICIT Virtual Briefing

Join ICIT SME’s and discover the top 3 things you can do now to begin implementing zero-trust in your organization.

ICIT Panelists and Contributors:
  • Lieutenant Commander Ian G. Simon, Information Warfare Training Command Corry Station
  • Major Steven Whitham, West Point Military Academy
  • Don Maclean, ICIT Fellow & Chief Security Strategist, DLT
  • Reggie Best, President & Chief Product Office,  FireMon, Federal
  • MODERATOR: Joyce Hunter, ICIT Executive Director

Session Outcomes:

  1. Learn to approach security with a zero-trust mindset instead of waiting for zero-trust products
  2. Gain an understanding of practical applications of zero-trust deployment models
  3. Discover the top 3 things you can do now to begin implementing zero-trust in your organization
  4. Hear examples of zero-trust maturity, and the types of protections and controls needed to achieve each level