The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
While making this progress, agencies must understand the impact a successful zero trust process can<br />
have on data and the future of government decision-making. <strong>The</strong>re are also key strategies and data<br />
governance policies that agencies can implement to abide by the CISA guidelines and find achievable<br />
solutions <strong>for</strong> a zero trust future.<br />
How Agencies Can Safeguard <strong>The</strong>ir Data<br />
<strong>The</strong> updated ZTMM from CISA claims that agency data should be protected on devices, in applications,<br />
and on networks in accordance with federal requirements, and that agencies should inventory,<br />
categorize, and label data; protect data at rest and in transit; and deploy mechanisms to detect and stop<br />
data exfiltration.<br />
Zero trust is all about enhancing your security posture. <strong>The</strong> balancing act of security and accessibility is<br />
possible through plat<strong>for</strong>ms that can operate independently from compute and storage layers which offer<br />
integrated security and governance based on metadata. <strong>The</strong> ideal zero trust approach will contain a data<br />
security plat<strong>for</strong>m capable of contextualizing across analytics and cloud environments while simplifying<br />
data delivery and access with a unified multi-tenant model.<br />
Ultimately, the approach of utilizing a secure plat<strong>for</strong>m to assist with zero trust will result in reduced<br />
cybersecurity risk and operational costs, all while allowing faster deployment of governed and secured<br />
data lakes <strong>for</strong> broader responsibly safeguarded data access.<br />
Role of Data in the Zero Trust Journey<br />
With data as one of the five main pillars of the ZTMM, it is critical that DOD moves to optimal maturity to<br />
properly secure our nation’s data and privacy. <strong>The</strong> DOD has already shared various plans and guidelines<br />
that focus heavily on data protection and management, so movement to an optimal zero trust position<br />
greatly aligns.<br />
<strong>The</strong>re<strong>for</strong>e, implementing the ZTMM will eliminate unauthorized access by bad actors and safeguard data<br />
from non-trusted sources. This is essential as data continues to play a key role in the federal<br />
government’s mission-critical operations. <strong>The</strong> optimal maturity of zero trust will better position defense<br />
agencies to protect their essential data, ranging from citizen services to military intelligence; all<br />
government data will be protected and safeguarded.<br />
Proper Governance Supports the Trek to Optimal<br />
Governance is a need as CISA also stated that agencies should carefully craft and review data<br />
governance policies to ensure all data lifecycle security aspects are appropriately en<strong>for</strong>ced across the<br />
enterprise. When you have proper governance with zero trust, it frees up the data so you can share it<br />
effectively within the organization. <strong>The</strong> data is protected and highly accessible by the team members who<br />
need it most.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 33<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.