how-to-get-to-zero-trust
How to Get to Zero Trust

Bryan Rosensteel has spent more than a decade working with identity in the Federal government. As a Federal solutions architect at identity services provider Ping Identity, he advises government agencies on best practices for deploying zero trust security architecture. When President Biden issued the Executive Order on Improving the Nation’s Cybersecurity (EO), Rosensteel was positively giddy about its potential to transform the way government secures data and operations. MeriTalk sat down with Rosensteel to explore the letter and the spirit of the EO, how centralized identity, credential, and access management (ICAM) can help agencies get to zero trust, and why agencies shouldn’t inherently trust anything – not even technology.

Please provide the information below. All fields are required.

  • By registering for this resource and providing my contact information, I consent that MeriTalk and its partners may contact me regarding with other relevant information, products, and services. Any information I supply is subject to MeriTalk's privacy policy.

Sponsor(s)