President Biden signed Executive Order 14028, “Improving the Nation’s Cybersecurity” to support our nation’s cybersecurity and protect the critical infrastructure and Federal Government networks underlying our nation’s economy and way of life.
Juniper Networks will host a 3-part Webinar Series examining the Executive Order, sharing details of the mandate and implications for federal agencies, why agencies should care, and how Juniper and our partners can deliver a Zero Trust security model.
For helpful insight straight from the experts:
Chuck Brooks, President of Brooks Consulting International
Shawn Wells, Managing Director for Cybersecurity Strategy and Technology at Accenture Federal Services
Gregory Garrett, VP Cybersecurity at Peraton
Herb Kelsey, Federal CTO at Dell Technologies
Eric Schlesinger, Operations & Engineering VP, Cyber Security at Parsons
Tom Van Meter, Senior SE Director at Juniper Networks
Learn more about the rise of Zero Trust: https://www.juniper.net/content/dam/www/assets/white-papers/us/en/security/the-rise-of-zero-trust.pdf,
Learn more about improving national cybersecurity: https://blogs.juniper.net/en-us/security/executive-order-14028-on-improving-national-cybersecurity-explained
1:34 We're going to be talking about Zero Trust and its implications to government agencies
3:26 Give framework for Zero Trust and what is in the government mandate
5:08 Specific milestones that must be completed by the end of 2024
5:45 Zero Trust is a mind change and it invokes the concept of explicit trust
6:00 Micro perimeters with policy enforcement
7:19 Trust no one, no thing and continually verify
8:26 Shift to application centric design patterns
10:56 A repeatable blueprint the agencies can share far and wide
12:18 Hoping the infrastructure can give us good information so that we can use secure machine learning models to supplement what human being do
13:30 Every government CIO, CISO, CTO is dealing with a technology patchwork quilt of hardware and software and every agency is unique
17:32 Zero Trust involves many vendors and we're all in this together
18:30 Translate NIST publication into actionable intelligence and drive behavior change
20:22 The technical community can help agencies by taking our expertise and partnering with our vendors and bring a bullet proof strategy and show how we meet the mandates
21:49 As agencies are moving to cloud native infrastructure and applications there is a need to dynamically reconfigure and optimize
25:09 Group effort to solve but needs clear direction from the top down
28:45 You can leverage your existing network infrastructure to become Zero Trust compliant
29:19 Can integrate with existing technologies
32:14 The government has developed some good documentation as starting points to assess where you are - point people to the CISA Zero Trust Security Model is a good place to start
32:2- Also the DoD Zero Trust Reference Guide has great information
32:45 And, GSA very early on put out a Buyer's Guide and a 5 step 5 step methodology
Juniper Networks will host a 3-part Webinar Series examining the Executive Order, sharing details of the mandate and implications for federal agencies, why agencies should care, and how Juniper and our partners can deliver a Zero Trust security model.
For helpful insight straight from the experts:
Chuck Brooks, President of Brooks Consulting International
Shawn Wells, Managing Director for Cybersecurity Strategy and Technology at Accenture Federal Services
Gregory Garrett, VP Cybersecurity at Peraton
Herb Kelsey, Federal CTO at Dell Technologies
Eric Schlesinger, Operations & Engineering VP, Cyber Security at Parsons
Tom Van Meter, Senior SE Director at Juniper Networks
Learn more about the rise of Zero Trust: https://www.juniper.net/content/dam/www/assets/white-papers/us/en/security/the-rise-of-zero-trust.pdf,
Learn more about improving national cybersecurity: https://blogs.juniper.net/en-us/security/executive-order-14028-on-improving-national-cybersecurity-explained
1:34 We're going to be talking about Zero Trust and its implications to government agencies
3:26 Give framework for Zero Trust and what is in the government mandate
5:08 Specific milestones that must be completed by the end of 2024
5:45 Zero Trust is a mind change and it invokes the concept of explicit trust
6:00 Micro perimeters with policy enforcement
7:19 Trust no one, no thing and continually verify
8:26 Shift to application centric design patterns
10:56 A repeatable blueprint the agencies can share far and wide
12:18 Hoping the infrastructure can give us good information so that we can use secure machine learning models to supplement what human being do
13:30 Every government CIO, CISO, CTO is dealing with a technology patchwork quilt of hardware and software and every agency is unique
17:32 Zero Trust involves many vendors and we're all in this together
18:30 Translate NIST publication into actionable intelligence and drive behavior change
20:22 The technical community can help agencies by taking our expertise and partnering with our vendors and bring a bullet proof strategy and show how we meet the mandates
21:49 As agencies are moving to cloud native infrastructure and applications there is a need to dynamically reconfigure and optimize
25:09 Group effort to solve but needs clear direction from the top down
28:45 You can leverage your existing network infrastructure to become Zero Trust compliant
29:19 Can integrate with existing technologies
32:14 The government has developed some good documentation as starting points to assess where you are - point people to the CISA Zero Trust Security Model is a good place to start
32:2- Also the DoD Zero Trust Reference Guide has great information
32:45 And, GSA very early on put out a Buyer's Guide and a 5 step 5 step methodology
- Category
- Juniper Networks
- Tags
- Zero Trust, Cybersecurity, Critical Infrastructure
Be the first to comment