Complete Zero Trust Starts With Identity
Complete Zero Trust Starts With Identity

Zero trust isn’t a buzzword anymore. This information security model, which denies access to applications and data by default, is now a strategic differentiator and a mission imperative.

Governments are generally ahead of their private-sector peers in zero trust adoption, in part due to mandates requiring cybersecurity and legacy technology modernization.

In this three-part program, we will assess the effects of the latest Federal strategy, mandates, and technical guidance on agency efforts to achieve zero trust, how an identity-first approach helps agencies design an efficient and effective zero trust defense, and what a comprehensive zero-trust solution looks like.

Watch: “Identity First” Accelerates Zero Trust

A comprehensive zero trust solution requires integrated, best-of-breed cybersecurity solutions working together to protect identity, devices, networks, applications and workloads, and data. This video explores progress toward zero trust and what a complete solution looks like.

Listen: The Role of Identity in the National Cybersecurity Strategy

In this episode of MeriTalking, MeriTalk’s Gail Emery sits down with Brandon Iske, a principal solutions architect at Okta, and Bill Wells, a senior solutions architect at Amazon Web Services, to discuss zero trust progress and challenges, why identity is the foundation of zero trust, and how Okta and AWS work together to help agencies achieve zero trust.

Read: How to Succeed With Identity: The Foundational, Impactful Pillar of Zero Trust

The zero trust information security model, which denies access to applications and data by default, is a strategic differentiator and a mission imperative, as agencies strive to meet requirements laid out in Federal strategies and mandates.

In an interview with MeriTalk, Brandon Iske, a principal solutions architect at identity platform provider Okta, and Bill Wells, a senior solutions architect at cloud provider Amazon Web Services, discuss identity as the foundation of zero trust and best practices for building a complete zero trust solution.

Download to read their insights.

 

Please provide the information below. All fields are required.

  • By registering for this resource and providing my contact information, I consent that MeriTalk and its partners may contact me. Any information I supply is subject to MeriTalk's privacy policy.

Sponsor(s)