Securing DoD Enterprise Innovation with ICAM
This event qualifies for 1 CPEs
Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department's complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met.
Join BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, Systems Innovation Scientist, Emerging Technology Directorate, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.
Our cybersecurity leaders will discuss:
- The Defense Department's outlook on Enterprise Network Modernization
- The path to secure modernization using least privilege or "Just-in-time" best practices
- Why PAM is critical when developing programs like ICAM and EITaaS
- How Zero Trust, ICAM and Enterprise Network Modernization correlate
Speaker and Presenter Information
![]() | ![]() | ![]() |
MG Joe Brendler US Army (Ret.) | Josh Brodbent Senior Public Sector Security Director, BeyondTrust | Stephen M. Wallace Systems Innovation Scientist, Emerging Technology Directorate |
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
BeyondTrust Government Team at Carahsoft