federalnewsnetwork.com
Open in
urlscan Pro
151.101.130.217
Public Scan
URL:
https://federalnewsnetwork.com/commentary/2023/07/meeting-zero-trust-goals-with-modern-cybersecurity-solutions/
Submission: On July 21 via api from FI — Scanned from FI
Submission: On July 21 via api from FI — Scanned from FI
Form analysis
4 forms found in the DOMGET https://federalnewsnetwork.com/search/
<form id="header-search-form" role="search" method="get" class="search-form search-form--header" action="https://federalnewsnetwork.com/search/" tabindex="-1">
<label class="search-form__label">
<span class="search-form__label-text">Search</span>
<input type="text" class="search-form__field" id="search-form__field" placeholder="Search …" value="" name="s" autocomplete="off">
</label>
<button id="searchsubmit" class="search-form__submit" type="submit" value="Search" aria-label="Submit search"><span>Submit </span>Search</button>
</form>
<form id="email-signup-mobile" class="email-signup-mobile" tabindex="-1">
<input class="email-signup__email" type="email" placeholder="Newsletter">
<button class="email-signup__submit" type="submit" aria-disabled="true">Submit</button>
</form>
GET https://federalnewsnetwork.com/search/
<form id="header-mobile-search-form" role="search" method="get" class="header-mobile-search-form" action="https://federalnewsnetwork.com/search/" tabindex="-1">
<label class="search-form__label">
<span class="search-form__label-text">Search</span>
<input type="text" class="search-form__field" id="search-form__field" placeholder="Search …" value="" name="s" autocomplete="off">
</label>
<button id="searchsubmit" class="search-form__submit" aria-disabled="true" type="submit" value="Search" aria-label="Submit search"><span>Submit </span>Search</button>
</form>
Name: emailsignupform — POST https://federalnewsnetwork.com/sailthru-newsletters-signup/
<form action="https://federalnewsnetwork.com/sailthru-newsletters-signup/" name="emailsignupform" id="sailthru-form-content" class="form form--red form--red visible" method="post">
<div class="form__row" id="form-inputs">
<legend class="form__title">Sign up for breaking news.</legend>
<input class="form__input" type="email" name="email" aria-label="Email Address" placeholder="Email Address" required="">
<input class="form__submit form__submit--white" type="submit" name="sbutton" aria-label="Sign up button" value="Signup">
</div>
<!-- button class="disclaimer"></button -->
</form>
Text Content
* Technology * Artificial Intelligence * Ask the CIO * Big Data * CIO News * Cloud Computing * Cybersecurity * IT Modernization * Open Data/Transparency * Reporter’s Notebook * Defense * On DoD * Army * Navy * Air Force * Space Operations * Defense Industry * Workforce/Management * Acquisition * Agency Oversight * Budget * Facilities/Construction * Hiring/Retention * Management * Unions * Workforce Rights/Governance * Pay & Benefits * Benefits * Fed Life * Open Season * Pay * Retirement * TSP * Commentary * Federal Report * Tom Temin * Audio * A Deeper Look with Joe Paiva * Accelerating Government * All About Data * Amtower Off-Center * Ask the CIO * The Business of Government Hour * Every Side of Cyber * Federal Drive * Federal Executive Forum * Fed Life * Federal Newscast * FEDtalk * For Your Benefit * GovNavigators * Innovation in Government * Inside the IC * Leaders & Legends * Modern Government * Off the Shelf * On DoD * Platform for the Mission * Search for Accountability * Security Clearance Insecurity * The Space Hour * Your Turn * More Audio Shows * Resources * Events & Webinars * FNN Knowledge Hub * Federal Insights * Ad & Sponsorship Opportunities Menu Search Search Submit Search On Air: Business of Government Hour Trending: * Telework rollbacks increasingly common * Telework an 'uphill battle' at SSA * VA: Independent oversight coming to acquisitions Email Alerts Listen Live * Listen * Schedule * Sports Schedule Listen Live Schedule * Technology * Artificial Intelligence * Ask the CIO * Big Data * CIO News * Cloud Computing * Cybersecurity * IT Modernization * Open Data/Transparency * Reporter’s Notebook * Defense * On DoD * Army * Navy * Air Force * Space Operations * Defense Industry * Workforce/Management * Acquisition * Agency Oversight * Budget * Facilities/Construction * Hiring/Retention * Management * Unions * Workforce Rights/Governance * Pay & Benefits * Benefits * Fed Life * Open Season * Pay * Retirement * TSP * Commentary * Federal Report * Tom Temin * Audio * A Deeper Look with Joe Paiva * Accelerating Government * All About Data * Amtower Off-Center * Ask the CIO * The Business of Government Hour * Every Side of Cyber * Federal Drive * Federal Executive Forum * Fed Life * Federal Newscast * FEDtalk * For Your Benefit * GovNavigators * Innovation in Government * Inside the IC * Leaders & Legends * Modern Government * Off the Shelf * On DoD * Platform for the Mission * Search for Accountability * Security Clearance Insecurity * The Space Hour * Your Turn * More Audio Shows * Resources * Events & Webinars * FNN Knowledge Hub * Federal Insights * Ad & Sponsorship Opportunities Submit Search Submit Search Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area. Commentary MEETING ZERO TRUST GOALS WITH MODERN CYBERSECURITY SOLUTIONS Chris Cullerot July 19, 2023 1:35 pm 4 min read Released earlier this spring, CISA’s Zero Trust Maturity Model 2.0 assists agencies in navigating their zero trust journey by offering a well-defined roadmap for the widespread adoption of zero trust in the government sector. A zero trust approach sets a high bar for security by assuming that every user, device and application is a potential threat and requires verification and authorization before granting access. CISA’s zero trust model provides federal agencies with a clear path... READ MORE Released earlier this spring, CISA’s Zero Trust Maturity Model 2.0 assists agencies in navigating their zero trust journey by offering a well-defined roadmap for the widespread adoption of zero trust in the government sector. A zero trust approach sets a high bar for security by assuming that every user, device and application is a potential threat and requires verification and authorization before granting access. CISA’s zero trust model provides federal agencies with a clear path to follow, making it another vital tool to help define the zero trust journey — one that will help them meet the September 2024 deadline set by the Office of Management and Budget’s memo, M-22-09 Federal Zero Trust Strategy. While every agency has a unique starting point, there are several steps that can help agencies as they work to achieve an “optimal” posture in their zero trust journey and meet upcoming deadlines. These steps include taking inventory of their current posture, continually modernizing to implement the strongest standards, considering the impact of supply chain security and improving detection of cyber incidents and investigative capabilities. UNDERSTANDING YOUR POSITION IN THE ZERO TRUST JOURNEY Proper security tools are essential to an agency’s defense against cyber-attacks. But first, agencies must have a complete understanding of their systems’ strengths and weaknesses. This includes knowing which tools are currently being utilized, which require enhancements, and which are lacking entirely. This creates a baseline for the agency’s zero trust position and establishes required actions. Insight by Carahsoft: In our new ebook, we look at sweeping federal initiatives and agency-specific efforts to empower the government’s cyber workforce — featuring from Air Force, FEMA, DoD, DHS, Navy and OPM leaders. A “rip and replace” approach is not a practical solution for cybersecurity infrastructure, so starting with a clear baseline can allow agencies to effectively support zero trust pillars of identity, devices, networks, applications and workloads and data by understanding where the cyberinfrastructure can be improved. MODERNIZING AND IMPLEMENTING STRONGER STANDARDS A focus on SLAs, dashboards with real-time analytics, and enterprise IT security posture can support agencies as they assess the effectiveness of their current security efforts. It can also ensure they align with increasingly vigorous standards, like the ones outlined in recent zero trust guidelines, and track the continued improvement of maturity levels over time. Key standards highlighted in zero trust guidelines include using enterprise-managed accounts, which allow employees access to everything they need while remaining reliably protected from sophisticated attacks, encrypting all network traffic and consistently testing enterprise applications. Federal security and data teams must also work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information. SECURING THE IT SUPPLY CHAIN Over the past couple of years, federal agencies have become keenly aware of the need to protect their IT supply chain. This includes implementing solutions that provide a flexible and customizable approach to evaluating vendors, and those that can help close down parts of the network if one portion of the security supply chain becomes compromised. These solutions and approaches are already playing an imperative part for various agencies across government. For example, to achieve the crucial balance between enhancing network security and enabling dynamic autonomous operations for law enforcement, the Treasury Department leveraged logical micro-segmentation and network-based segmentation to help strengthen network security. Segmenting the agencies’ network can isolate environments and prevent compromised components from jeopardizing the entire network. This approach has proven highly effective in maintaining the security and reliability of operations. IMPROVING DETECTION OF CYBER INCIDENTS AND REMEDIATION CAPABILITIES The sheer volume of cyber incidents that analysts receive in a cabinet-level security operations center makes it impossible to appropriately assess each one and quickly identify those that require immediate attention. Agencies need access to tools that can automate detection and prioritization so analysts can take appropriate actions fast enough to address a threat. Should a severe incident take place, their ability to contain, eradicate and recover from the event is crucial. As part of its process of enforcing a uniform approach to cyber incidents, the Environmental Protection Agency worked toward automating functions of its security and risk team’s responsibilities. Implementing a security incident response module helped structure security operation agency-wide, enabling a more uniform approach to emerging threats. Utilizing security orchestration and automation response helped reduce manual errors and streamlined response processes, improving the agency’s ability to respond to threats quickly. Read more: Commentary By embracing zero trust principles, agencies can be more proactive and diligent in protecting their IT infrastructure and users in today’s digital landscape. However, it’s a big undertaking that requires ongoing effort to implement fully. To identify which standards need strengthening, agencies must understand their position in their zero trust journey. From there, agencies can make informed decisions on flexible cybersecurity solutions that align with Zero Trust Maturity Model 2.0 pillars. This will help accelerate the implementation of zero trust without compromising compliance requirements and citizens’ needs, all while limiting the impact of a potential breach. By taking small steps, agencies can evaluate their current compliance levels, create plans to increase maturity and stay informed and aligned with federal guidance and regulations. Chris Cullerot is director of technology and innovation at iTech AG. Copyright © 2023 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area. * Go Apple's Website to download the APP * Go Google's Website to download the APP Sign up for breaking news. RELATED STORIES Amelia Brust/Federal News Network NATIONAL CYBERSECURITY STRATEGY CALLS FOR SIGNIFICANT CHANGE IN CRITICAL INFRASTRUCTURE Commentary Read more WHAT’S NEXT FOR AGENCIES IN THEIR ZERO TRUST JOURNEY Commentary Read more FOR VA, MOVING TO ZERO TRUST IS SIMPLE CONCEPT TO UNDERSTAND, BUT TOUGH TO IMPLEMENT Ask the CIO Read more Related Topics Chris Cullerot Commentary Cybersecurity IT Modernization iTech AG Technology zero trust AROUND THE WEB DOWNLOAD 16,000+ WOODWORKING PLANS FOR JUST $67 BUILD YOUR OWN STUFF TedsWoodworking THE 50 MOST ROMANTIC HOTELS IN THE WORLD bakeinto AGE DOESN'T MATTER FOR THESE 32 FAMOUS COUPLES Inspiredot 11 PECULIAR HOUSES FROM AROUND THE WORLD THAT WILL IMPRESS YOU Inspiredot WHAT WILL HAPPEN IF YOU EAT GINGER EVERY DAY? Inspiredot 15 PLAYFUL CATS STICKING THEIR TONGUES OUT AT YOU Inspiredot BOOST YOUR MOOD WITH THESE HILARIOUS TWEETS FROM CAT OWNERS Inspiredot THEY WERE STARS BEFORE BUT NOW EVEN PAPARAZZI DON'T FOLLOW THEM Inspiredot LUXURY TRAVEL DESTINATIONS OFTEN VISITED BY RICH & FAMOUS PEOPLE Inspiredot The content you see here is paid for by the advertiser or content provider whose link you click on, and is recommended to you by Revcontent. As the leading platform for native advertising and content recommendation, Revcontent uses interest based targeting to select content that we think will be of particular interest to you. We encourage you to view your opt out options in Revcontent's Privacy Policy WANT YOUR CONTENT TO APPEAR ON SITES LIKE THIS? Increase Your Engagement Now! WANT TO REPORT THIS PUBLISHER'S CONTENT AS MISINFORMATION? Submit a Report Got it, thanks! THE LATEST IN GOVERNMENT EVENTS POWERED BY: 7|27 Kelley Barracks Tech Expo 7|27 CISA Tabletop Exercise Package (CTEP)... 7|27 Tampa Cybersecurity Conference View More Events Post Your Event RELATED STORIES * National Cybersecurity Strategy calls for significant change in critical infrastructure Commentary * What’s next for agencies in their zero trust journey Commentary * For VA, moving to zero trust is simple concept to understand, but tough to implement Ask the CIO TOP STORIES * VA says ‘true independent’ oversight coming to major acquisitions after lawmaker probes Top Story * ‘Trustworthy AI’ executive order in the works for agencies to keep risks in check ARTIFICIAL INTELLIGENCE * CISA sees CDM program entering ‘new era’ with focus on cyber defense operations CYBERSECURITY * Intelligence community and Defense Department to share classified cloud services DEFENSE * USDA leaning harder into software-as-a-service to satisfy mission needs ASK THE CIO Federal News Network About FNN * News Team * Careers * Contact Us Connect * Events * Press Releases * RSS Feeds Partnerships * Advertise * Partners & Events * Hubbard Radio * Insights Listen * Podcasts * Radio Shows * Sports * WTOP * Follow Federal News Network on Linkedin * Follow Federal News Network on Facebook * Follow Federal News Network on Twitter * Go Apple's Website to download the APP * Go Google's Website to download the APP * Terms of Use * Copyright/Usage Policy * DMCA Notice * Privacy Policy * Comment Policy * EEO Report * FCC Online Public Inspection File * FCC Applications Need help accessing the FCC Public File due to a disability? Please contact Susan Rushkowski at publicfiledc@hubbardradio.com or (202) 895-5027. Copyright 2023 Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area. Update Privacy Preferences A Raptive Partner Site