-
Original Series
Subscribe to Updates
Be the first to know when new content hits
Reimagining Zero Trust in the DoD
Zero Trust strategies aim to establish perimeterless security, implementing IT systems that keep Federal organizations safe from cyberattacks amid a perilous threat environment. How does an organization implement zero trust in one of the most complex, secure environments? Join us at Adapt 2024 as we deep dive into the core principles of zero trust in the Department of Defense (DoD) and examine zero trust principles including micro-segmentation, least privilege access, and continuous authentication, along with how these pillars translate into a robust and comprehensive approach to modern and pervasive cyber threats. In this opening keynote session, a top DoD official will share real-world case studies and examples of deploying a zero trust architecture across diverse DoD networks and systems – and the cultural shift that must accompany the transition.