Securing DoD Enterprise Innovation with ICAM
Date: September 16, 2021
Hosted By: BeyondTrust & Carahsoft
Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department’s complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met.
Listen to this podcast with BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, DISA, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.
"Zero Trust is a design methodology. It's not a product that you can go and buy and put the flag in the ground and declare success. It's really a methodology and you deploy systems." - Stephen M. Wallace, Systems Innovation Scientist, Emerging Technology Directorate, DISA
These cybersecurity leaders discussed:
Fill out the form and access the full podcast to learn more.