Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

Leaders from NSA, CDC, Department of Education, and the U.S. Army Corps of Engineers Discuss Zero Trust Architecture Security Strategies

by Kelsey Winick
August 24, 2021
in Civilian, Cybersecurity, Digital Transformation, Network Modernization, Transformative Tech
Reading Time: 4 mins read
A A
Zero Trust Architecture
Share on FacebookShare on Twitter

The recent escalation in cyberattacks against private and public sector organizations has compelled CISOs to reexamine their cybersecurity postures. Both the National Institutes of Standards and Technology (NIST) and the Biden Administration have recently released publications about implementing Zero Trust Architecture (Zero Trust) to agencies’ cybersecurity strategies. The President’s Executive Order, issued in May following NIST’s Special Publication at the end of 2020, illustrated how agencies need to refresh their security to incorporate Zero Trust in order to better defend against threat actors. Days after the Executive Order was published, the ransomware attack on the Colonial Pipeline occurred, which disrupted the United States’ largest fuel pipeline. These events continued to alert agencies of the importance of Zero Trust and how implementing NIST’s model can evolve security strategies for the better.

Recently, Dovarius Peoples, Chief Information Officer at the U.S. Army Corps of Engineers; Steven Hernandez, Chief Information Security Officer at the Department of Education; Kevin Bingham, Zero Trust Technical Lead, Cybersecurity Directorate at the National Security Agency; Paul Morris, Chief Information Security Officer at Centers for Disease Control and Prevention; Jim Richberg, Public Sector Field Chief Information Security Officer and Vice President of Information Security at Fortinet; John Davis, Vice President, Public Sector at Palo Alto Networks; and Joseph Hamblin, Chief Technology Officer, Department of Defense at Verizon met to discuss how Zero Trust security strategies will influence government now and in the future.

Kevin Bingham, Zero Trust Technical Lead, Cybersecurity Directorate at the National Security Agency, commented that agencies need to break away from the “legacy mindset of programs and what’s been done in the past” and shift focus to improving security from inside the network. “We looked at the Zero Trust model and thought that it encompasses a disciplined approach that starts with understanding different pillars of functional capability areas that workers need” to concentrate on. With Zero Trust strategies, agencies embrace the concept of fully verifying users with no implied trust.

Joseph Hamblin, Chief Technology Officer, Department of Defense at Verizon, emphasized how important it is for agencies to educate and train users in order to successfully deploy Zero Trust strategies. At the U.S. Army Corps of Engineers, they developed a Zero Trust playbook that goes through 12 different areas. “When most people talk about Zero Trust, you only see it from about three different perspectives, but we’ve gone from all aspects of Zero Trust to include the training aspects, from the executive level down to the technician that is responsible for implementing Zero Trust,” shared Dovarius Peoples, Chief Information Officer at the U.S. Army Corps of Engineers. “Ultimately, in order to implement and execute, you have to be trained and we put a heavy emphasis on the training of our personnel.”

While applying Zero Trust strategies is a gradual process, Hamblin said that the Executive Order “put an emphasis on collapsing the time frame in order to maintain performance.” He mentioned that one way to do so is through “knowing who the actual user of the device is, so agencies can start making identity decisions about what resources they should receive access to.” Centers for Disease Control and Prevention’s Paul Morris said that, by performing “administrative and technical checks, agencies can make sure users are granted access to only what they need. We go through these checks before we grant access. We cycle the credentials users are using with a new password every time that gets thrown in the trash afterward. Then, we watch them and make sure that those users who are using those elevated privileges are staying where they should be.”

Implementing a Zero Trust approach will shift agencies’ perspectives on cybersecurity and will improve cybersecurity standards. Training and education will make implementation easier for agencies and help to accomplish their mission with these new strategies. Zero Trust is “the pursuit of perfection,” concluded the Department of Education’s Hernandez. “We will likely never get there, but we’re going to pursue it.”

To hear more from the Zero Trust panel, click here.

Tags: CDCCenters for Disease Control and PreventioncybersecurityDepartment of EducationDoENational Institutes of Standards and TechnologyNational Security AgencyNISTNSAU.S. Army Corps of EngineersVerizonZero TrustZero Trust Architecture

RELATED POSTS

Fixed Wireless Access
Defense & IC

Fixed Wireless Access Drives Connection for Remote Work: A Podcast

February 3, 2023
A representation of digital inclusion - a sky with a cityscape behind and a bunch of technological devices and figures represented in circles and connected in the sky
Digital Transformation

Digital Inclusion Initiatives Target Digital Divide

February 1, 2023
Identifying the Building Blocks for a Successful Zero Trust Journey
Civilian

Identifying the Building Blocks for a Successful Zero Trust Journey

January 24, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8500 shares
    Share 3400 Tweet 2125
  • Network Slicing Enables Agencies to Create Private, Secure, and Customized Networks: A Podcast

    124 shares
    Share 50 Tweet 31
  • CISA Issues Updated Guidance to Protect Federal Agencies Against Expected Onslaught of DDoS Attacks

    32 shares
    Share 13 Tweet 8
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    40 shares
    Share 16 Tweet 10

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us