The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Achieving Optimal Zero Trust Maturity: <strong>The</strong><br />
Role of Data and Governance<br />
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions<br />
<strong>The</strong> federal government has placed a stronger emphasis on zero trust since OMB’s federal zero trust<br />
strategy memo from the beginning of 2022, requiring agencies to have a security model in place that<br />
assumes every device, application, or user attempting to access a network cannot be trusted.<br />
Most recently, the <strong>Cyber</strong>security and Infrastructure Security Agency (CISA) issued a second version of<br />
its Zero Trust Maturity Model (ZTMM 2.0), which provides a roadmap to guide agencies to a zero trust<br />
model by 2024. <strong>The</strong> ZTMM is a combination of five pillars: identity, devices, networks, applications and<br />
workloads, and data. It also addresses four levels of maturity, providing useful in<strong>for</strong>mation <strong>for</strong> agencies<br />
regardless of their location on the zero trust journey (traditional, initial, advanced, optimal).<br />
With the impending deadline, the Department of <strong>Defense</strong> is feeling the pressure and making strides<br />
toward implementing the ZTMM to reach the “optimal” stage of maturity. DOD’s approach to a zero trust<br />
strategy will equip the Department with the guidelines to instill the “never trust, always verify” mindset,<br />
along with a map of how to implement the zero trust strategy across all components of the agency,<br />
including capabilities, technologies, solutions, and processes.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 32<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.