Zero Trust Implementation: A How-To Guide

With all of the components of Zero Trust, there are various models and theories that an organization can use to strengthen their cybersecurity practices. The CISA Zero Trust Maturity Model and the DoD Zero Trust Strategy are only two examples of frameworks that provide guidance on implementing Zero Trust security principles within an organization. Both models emphasize the steps it takes to achieve total Zero Trust, but they differ in some of their strategies. Understanding the features of these frameworks, and other models, will help organizations develop effective strategies for implementing ZT. 

 

Tune in to hear from cybersecurity experts from across the Federal government discuss what models and theories they follow, as well as how these two foundational ZT models impact their security practices.

Speaker and Presenter Information

Michele ThomasChief Information Security Officer, Office of the Under Secretary, Science and Technology Directorate, U.S. Department of Homeland Security (Pending Agency Approval)

 

Ian RodriguezChief Cybersecurity Architect/Zero Trust Lead, Office of the Chief Information Officer, U.S. Office of Personnel Management (Pending Agency Approval)

 

Gerald Caron IIIChief Information Officer Chief Information Officer, International Trade Administration, U.S. Department of Commerce (Pending Agency Approval)

 

Shelton RaineyDeputy Chief Information Security Officer, U.S. Federal Communications Commission (Pending Agency Approval)

 

Joe Lewis Sr.Chief Information Security Officer and Director, Cyber Security Program Office, Centers for Disease Control and Prevention, U.S. Department of Health and Human Services (Pending Agency Approval)

 

Jane RathbunChief Information Officer (Acting), Office of the Chief Information Officer, Under Secretary of the Navy, U.S. Department of the Navy (Pending Agency Approval)

Leave a Comment

Scroll to Top