How to Follow DoD Zero Trust Guidelines
Zero Trust .... But Verify
Zero trust security is a necessity in modern cybersecurity frameworks, endorsed by comprehensive directives from the United States Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA). The DoD Zero Trust Strategy alongside the DoD Zero Trust Capability Execution Roadmap offers in-depth guidance designed to facilitate any organization's transition to a robust Zero Trust model.
Join Federal Security Expert Scot Wilson and Federal Technology Solutions Architect Sean Deveci to learn how organizations are using Forward Enterprise to simplify their Zero Trust journey. They will demonstrate how leveraging a network digital twin can empower both government and private sector organizations to seamlessly implement and verify a Zero Trust architecture.
During the session, Scot and Sean will demonstrate how Forward Enterprise supports several of the Zero Trust foundational pillars identified by the DoD:
- Device: Rigorous device security and control mechanisms (CVE, STIGs, config hardening).
- Application & Workload: Protection strategies for applications and their workloads.
- Network & Environment: Segmentation and Security posture verification across diverse environments.
- Automation & Orchestration: Enhancing response capabilities through automation.
- Visibility & Analytics: Advanced analytics for proactive security management.
Speaker and Presenter Information
Scot Wilson, and Sean Deveci Technology Solutions Architects at Forward Networks
Relevant Government Agencies
DOD & Military, Other Federal Agencies, Federal Government, State & Local Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Thu, Sep 12, 2024, 2:00pm - 2:30pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
Forward Networks