BeyondTrust Podcast

Aligning ICAM, the Executive Order, and Zero Trust for the Defense Department

Friday, June 17, 2022

Hosted By: BeyondTrust & Carahsoft

Summary

 

In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term “Zero Trust” from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify, and only allow access when contextual parameters are met. Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must protect identities to stop adversaries from getting into our networks, moving laterally, escalating privileges, and ultimately accessing and manipulating our data. Leveraging ICAM and robust identity security strategies enables agencies to move from a network-based approach to a data-centric approach to defending systems.

Listen to this podcast with BeyondTrust, where Josh Brodbent, BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, DISA, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.

"The implementation of a PAM solution makes it harder for them to do damage in the first place with least principles applied to them based on who we think they are. And then it also makes it harder for them to accomplish the escalation of privileges to do more damage while appearing to be someone with a higher privilege." - MG Joe Brendler, U.S. Army (retd.)

These cybersecurity leaders discussed:

  • Why Privileged Access Management (PAM) is essential to major DoD initiatives like ICAM, Thunderdome, and Zero Trust
  • How ICAM supports the Executive Order
  • The Defense Department’s outlook on data-centric security and defending agency systems
  • The path to secure modernization using Least Privilege

Fill out the form and access the full podcast to learn more.


Speakers

MG Joe Brendler

US Army

Deep Water Point

Joseph A. Brendler most recently was Chief of Staff for the United States Cyber Command. In that role, he directed, integrated, and synchronized the activities of the USCYBERCOM headquarters and led and mentored all staff officers.
Stephen Wallace

Chief Technology Officer

DISA

Stephen Wallace is chief technology officer of the Defense Information Systems Agency. He also serves as the director of DISA’s Emerging Technology Directorate. Wallace focuses on delivering innovative processes, services and capabilities across the agency.
Josh Brodbent

Senior Public Sector Security Director

BeyondTrust

Josh has more than 20 years in IT experience and has architected identity and privilege access management solutions for over 3 million user accounts. He joined BeyondTrust in 2018 as a Senior Solutions Engineer and was quickly selected to lead the team. Prior to BeyondTrust, he was a senior Solutions architect for Quest Software. He began his career by founding a managed service provider (MSP) at 12. He held multiple industry certifications by 14, making him the youngest in the nation to do so. That MSP went on to become successful, and ultimately his launching point into Public Sector architecture and support.

Access Full Podcast Now

* Denotes required