Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCyber BalkansThe Government's Lessons from the Private Sector in Achieving Zero Trust

The Government’s Lessons from the Private Sector in Achieving Zero Trust

Published on

spot_img

Kevin Kirkwood, the Deputy CISO of LogRhythm, reflects on the progress and challenges faced by the U.S. government in the pursuit of Zero Trust Architecture. President Biden’s Executive Order on Improving the Nation’s Cybersecurity, issued over two years ago, marked a significant step in modernizing U.S. government security defenses and emphasizing the importance of prioritizing security across federal, state, and local agencies.

The upcoming target of September 2024 for the White House’s Zero Trust implementation has prompted a renewed focus on cybersecurity within government agencies. However, recent cyberattacks, such as the Russian cyberattack that targeted U.S. government agencies, schools, hospitals, and local government institutions, have underscored the need for more robust security measures.

In response to these challenges, the Cybersecurity and Infrastructure Security Agency (CISA) released the second version of its Zero Trust Maturity Model, which provides a guide for federal agencies on the path to Zero Trust. The model acknowledges that different agencies are at varying stages of their Zero Trust journeys, with some facing obstacles due to legacy infrastructure and resource limitations.

Kirkwood asserts that the public sector can learn valuable lessons from the private sector when it comes to implementing Zero Trust. He emphasizes the importance of adopting the agility and flexibility of the business world to streamline the progress of Zero Trust projects, especially with looming implementation deadlines.

When planning to build out a Zero Trust program, Kirkwood recommends that government agencies begin by conducting a comprehensive assessment of their current security posture to identify potential gaps and threats. Following the assessment, agency leaders can then plan the transition and define goals for the project’s outcome, while also allocating necessary resources for implementation.

The execution of Zero Trust is highlighted as a critical phase, requiring agencies to ensure that employees receive dedicated training on working within the newly deployed architecture. Additionally, Kirkwood stresses the importance of implementing processes for monitoring and continuous improvement of Zero Trust architecture even after deployment is complete.

Looking ahead, Kirkwood anticipates that conversations about Zero Trust implementation will continue to dominate the public sector in the coming year. He believes that by drawing from the experiences of the private sector, government agencies can gain insights into which steps to take and which to avoid along their Zero Trust journeys.

In conclusion, Kirkwood reiterates the need for the public sector to leverage the expertise and best practices honed in the private sector as it pursues Zero Trust. By doing so, government agencies can build a more secure future and ensure the protection of critical infrastructure and sensitive data.

Source link

Latest articles

FBI and CISA Sound the Alarm on Growing Medusa Ransomware Attacks

The infamous hacking group known as Medusa developers has been making headlines once again,...

WatchGuard introduces FireCloud Internet Access

WatchGuard Technologies, a well-known unified cybersecurity provider, has introduced a groundbreaking product called FireCloud...

Medusa Ransomware Detection: FBI, CISA, and Partners Issue Warning on Rising Attacks against Critical Infrastructure by Ransomware Actors

In a report by Sophos, the costs associated with ransomware recovery have surged to...

Risks of API Hooking Highlighted by OBSCURE#BAT Malware

Researchers from a prominent cybersecurity firm have unearthed a sophisticated attack chain that is...

More like this

FBI and CISA Sound the Alarm on Growing Medusa Ransomware Attacks

The infamous hacking group known as Medusa developers has been making headlines once again,...

WatchGuard introduces FireCloud Internet Access

WatchGuard Technologies, a well-known unified cybersecurity provider, has introduced a groundbreaking product called FireCloud...

Medusa Ransomware Detection: FBI, CISA, and Partners Issue Warning on Rising Attacks against Critical Infrastructure by Ransomware Actors

In a report by Sophos, the costs associated with ransomware recovery have surged to...