01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Why <strong>Cyber</strong> Resilience Aligns with Zero Trust<br />

Federal agencies are leaning hard toward adopting Zero Trust security architectures under mandate to<br />

do so from the President’s 2021 Executive Order on Improving the Nation’s <strong>Cyber</strong>security, as well as<br />

other guidance. <strong>The</strong>y also need to do so, as Zero Trust is proving a robust means of keeping cyberattackers<br />

at bay.<br />

When it comes to cyber resilience, adopting a Zero Trust mentality and architecture is an excellent place<br />

to start. Zero Trust assumes that access and networking within an organization can never be trusted. It<br />

calls <strong>for</strong> users, devices, and systems to be authenticated first be<strong>for</strong>e connecting, and then re-verified at<br />

multiple points be<strong>for</strong>e accessing networks, systems, and data.<br />

For those transitioning to a Zero Trust architecture, CISA’s Zero Trust Maturity Model offers a framework<br />

of five foundational pillars covering: Identity (and access), Devices (e.g., Bring Your Own Device policies),<br />

Networks, Applications, and Data. It then builds in Governance and Analytics, to help measure, monitor,<br />

and develop automations to assist with fatigue and mistakes that result from manual updates.<br />

This level of cybersecurity in turn gives a firm grounding to cyber resilience, by preventing many of the<br />

most common attacks be<strong>for</strong>e they can infiltrate or impact critical data and systems. Again: cyber security<br />

and cyber resilience go hand in hand.<br />

As the federal government pursues Zero Trust goals, it should view this ef<strong>for</strong>t as a foundation <strong>for</strong> an<br />

expanded view of what security entails. Zero Trust is the bedrock upon which to move beyond mere<br />

defense and to layer in cyber resilience so agencies can meet the main objective of security: operational<br />

continuity.<br />

Like cybersecurity, cyber resilience is a means to an end. Both look to safeguard critical data and<br />

systems, but cyber resilience takes it one step further. Recognizing that even the best defenses can be<br />

breached, cyber resilience looks to ensure that agencies can continue to meet the needs of citizens and<br />

stakeholders, uphold national security, and accomplish the myriad other vital tasks of government,<br />

regardless of what the bad actors may try next.<br />

About the Author<br />

Amanda Satterwhite, Managing Director of <strong>Cyber</strong> Growth & Strategy at<br />

Accenture Federal Services, is responsible <strong>for</strong> growth, innovation, and go-tomarket<br />

strategy. Satterwhite leads cyber mission and enablement <strong>for</strong> the<br />

company’s National Security Portfolio, managing a team responsible <strong>for</strong> creating<br />

cutting-edge solutions <strong>for</strong> national security missions.<br />

Amanda can be reached online at https://www.linkedin.com/in/mandysatterwhite<br />

and via the company website https://www.accenture.com/us-en/industries/afsindex<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!