How to Follow DoD Zero Trust Guidelines



Zero Trust .... But Verify


Zero trust security is a necessity in modern cybersecurity frameworks, endorsed by comprehensive directives from the United States Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA). The DoD Zero Trust Strategy alongside the DoD Zero Trust Capability Execution Roadmap offers in-depth guidance designed to facilitate any organization's transition to a robust Zero Trust model.

 

Join Federal Security Expert Scot Wilson and Federal Technology Solutions Architect Sean Deveci to learn how organizations are using Forward Enterprise to simplify their Zero Trust journey. They will demonstrate how leveraging a network digital twin can empower both government and private sector organizations to seamlessly implement and verify a Zero Trust architecture.

 

During the session, Scot and Sean will demonstrate how Forward Enterprise supports several of the Zero Trust foundational pillars identified by the DoD:

  • Device: Rigorous device security and control mechanisms (CVE, STIGs, config hardening).
  • Application & Workload: Protection strategies for applications and their workloads.
  • Network & Environment: Segmentation and Security posture verification across diverse environments.
  • Automation & Orchestration: Enhancing response capabilities through automation.
  • Visibility & Analytics: Advanced analytics for proactive security management.

Speaker and Presenter Information

Scot Wilson, and Sean Deveci Technology Solutions Architects at Forward Networks

Relevant Government Agencies

DOD & Military, Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, Sep 12, 2024, 2:00pm - 2:30pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Forward Networks


Contact Event Organizer



Return to search results