Identity: The First Pillar of Zero Trust

Zero trust is vital for our nation’s cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, Cybersecurity and Infrastructure Security Agency (CISA) drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated— but it doesn’t have to be. In this engaging session, you’ll learn:

  • Why Identity is Pillar #1
  • How Identity informs your entire Zero Trust Architecture
  • The Identity maturity stages and how to transform your agency from Traditional to Optimal

Preview image
Sponsored by

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms and Conditions apply.

IMPORTANT NOTICE
Any information you supply is subject to our privacy policy. Access to this content is available to registered members at no cost. In order to provide you with this free service, Government Executive Media Group may share member registration information and other information you have provided to us with content sponsors.