During this webinar, you will learn how to:
- Establish the criteria for defining an agency's most sensitive and valuable data
- Delineate elements of the network, including third-party access, to be addressed in a zero trust architecture
- Define the role of strong identity management and its role in zero trust
- Identify all applications used by the networks for continuous monitoring
Featured Speakers:
- Jeffrey Lush, Chief Information Officer, Air University, U.S. Air Force
- Drew Epperson, Director, Federal Engineering & Chief Architect, Palo Alto Networks
- Michael Kennedy, Discussion Moderator, Contributing Editor, FedInsider