As the deadline quickly approaches for the military services to submit their respective zero trust execution plans, one thing is clear: the services are aggressively pushing to reach their zero trust goals. However, cyber experts across the military services agree that they must remain smart as they make moves toward their zero trust goals.
Department of Defense (DoD) Chief Information Officer (CIO) John Sherman said today that defense and military agencies must submit zero trust plans to his office in the coming weeks to be evaluated and to determine how they measure up to the DoD’s Zero Trust Strategy.
The U.S. Army has embarked on a three-phase zero trust journey to ensure it meets the Department of Defense’s (DoD) Zero Trust goal to implement a department-wide framework by 2027.
While zero trust security has become headline news for government agencies since 2021, the Department of the Air Force has been working and learning in that space for several years and is being guided by several roadmaps that incorporate zero trust principles on a strategic level, a senior Air Force tech official said this week.
Implementing a zero trust architecture is a must for all Federal agencies, but how that architecture is implemented relies heavily on the operational and business needs of an individual agency.
As Federal agencies ramp up their zero trust capabilities, a new report released today by security automation provider Swimlane finds that “67 percent of federal government agencies are confident or very confident they are prepared to meet the Zero Trust requirements laid out by the U.S. government.”
It’s no longer a question of whether Federal agencies should implement a zero trust model for cybersecurity, but what methods they should implement to get to that goal.
The Defense Information Systems Agency (DISA) awarded Booz Allen Hamilton big money to continue work on the agency’s zero trust network access and application security architecture, Thunderdome, according to a July 28 announcement.
Federal agencies have been tasked with implementing zero trust architectures to protect valuable systems, networks, and data from cyber threats. However, there is no one size fits all zero trust implementation plan, as Federal officials showed in discussing their agencies’ progress during a June 8 webinar hosted by ATARC.
With its new National Cybersecurity Strategy, the Biden administration is doubling down on moving the Federal government to a zero trust security architecture, following last year’s mandate to set specific zero trust goals by the end of fiscal year 2024.
The Department of Health and Human Services (HHS) Office of the Chief Information Officer (OCIO) is rolling out a new zero trust scorecard across the agency’s different operating divisions to accelerate zero trust security adoption and drive strategy across HHS.
To have quality data an agency first needs to have quality software, which means agencies must modernize and develop their software and that also requires implementing zero trust principles, according to an official from the Department of the Army.
With the migration to zero trust security architectures is in full swing in the Federal government, top agency technology executives shared their experience with effective strategies and technologies they have implemented thus far during an April 25 webinar organized by Federal News Network.
One of the Federal government’s top cybersecurity officials said today that the Biden administration is requesting roughly $12 billion in fiscal year (FY) 2024 funding in connection with efforts to roll out zero trust security across the entire government, and voiced concern about the fate of the security push if Congress acts to roll back government funding levels to FY2022 levels.
The Cybersecurity and Infrastructure Security Agency (CISA) today published an updated, second version of its Zero Trust Maturity Model that is guiding Federal agencies and other organizations along the path to adopting zero trust security architectures.
The Cybersecurity and Infrastructure Security Agency (CISA) is considering turning its current Trusted Internet Connections (TIC) program office into an office that supports Federal agencies as they pursue requirements from CISA and the Office of Management and Budget (OMB) to migrate to zero trust security architectures.
The General Services Administration (GSA) was an early adopter of zero trust security architecture, and Chief Information Officer (CIO) David Shive said this week that the next step for the agency is to focus on application-level security.
The challenge of implementing zero trust is explaining the benefits to the end users, Federal and industry cybersecurity experts said today at the Zscaler Public Sector Summit in Washington, D.C.
If you’ve been wondering how much the Federal government is investing in its sweeping effort to migrate to zero trust security architectures, the answer to that question may be coming this week.
The Department of Justice (DoJ) chief information officer (CIO) said today that the agency’s component offices have provided “overwhelming” feedback to ZScaler’s zero trust network access (ZTNA).
Thomas Santucci, director of the Data Center & Cloud Optimization Initiative program management office at the General Services Administration (GSA), is pointing Federal agencies to sources of expertise including CIO Council guidance and FedRAMP (Federal Risk and Authorization Management Program) as they navigate through requirements for the migration to zero trust security architectures.
The Department of Defense (DoD) released an updated version of its Cybersecurity Reference Architecture (CSRA) – the fifth iteration of this document – laying out new objectives closely aligned to the broader DoD zero trust strategy.
The Defense Information Systems Agency (DISA) has officially completed work to prototype its Thunderdome zero trust security project, and has rolled out the system to about 1,600 users so far, with more on the way, a senior DISA official said today.
Successfully implementing a zero trust architecture can oftentimes be a challenge for organizations, especially when there is a lack of buy-in at the executive level. To help clear that kind of hurdle, Federal officials say the secret sauce is developing a zero trust business case.
As the Federal government continues to execute on fundamental shifts in network security strategies like the move to zero trust architectures, agency tech leaders are emphasizing the need to push back against the status quo of established technology thinking.
Federal agency tech leaders this week identified issues of cost and culture when it comes to the biggest challenges to implementing zero trust security architectures.
Top Federal officials from largely public-facing agencies explained at a Dec. 1 GovExec event how zero trust security, if adopted correctly, will inherently end up improving customer experience (CX).
Ensuring a strong cyber posture against current and anticipated threats across the Department of Defense (DoD) has become an increasingly important priority as evidenced by the Pentagon’s release of the DoD Zero Trust Framework Strategy and Roadmap last month, an agency official said.
The Department of Defense (DoD) today released its long-anticipated zero trust strategy and roadmap outlining how the agency plans to fully implement a department-wide zero trust cybersecurity framework by fiscal year (FY) 2027. “What is significant about the strategy is that the strategy makes zero trust tangible and achievable while recognizing a dynamic and frankly, […]
Federal cybersecurity experts explained at a Nov. 8 ATARC event that the road to zero trust security is a long and often bumpy journey that their agencies at still learning to navigate, despite some being in the game for several years now.