{"id":10579,"date":"2025-05-09T18:23:51","date_gmt":"2025-05-09T23:23:51","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=10579"},"modified":"2025-05-16T08:41:04","modified_gmt":"2025-05-16T13:41:04","slug":"carahsoft-technet-cyber-tradeshow-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/","title":{"rendered":"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More\u00a0"},"content":{"rendered":"\n<p>Technology is a vital part of the United States Department of Defense (DoD)\u2019s capabilities, making security and enhancements essential to the nation&#8217;s stability and growth. AFCEA International\u2019s flagship event, TechNet Cyber, emphasizes the role of cybersecurity and IT within the DoD. Alongside its partners, such as such as <a href=\"https:\/\/www.carahsoft.com\/aws\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - AWS Microsite\" rel=\"noreferrer noopener\">Amazon Web Services (AWS)<\/a>, <a href=\"https:\/\/www.carahsoft.com\/everfox\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - Everfox Microsite\" rel=\"noreferrer noopener\">Everfox<\/a> and <a href=\"https:\/\/www.carahsoft.com\/ciena\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - Ciena Microsite\" rel=\"noreferrer noopener\">Ciena<\/a>, Carahsoft attended TechNet Cyber to support DoD&nbsp;mission objectives. Carahsoft maintains a unique position in the defense industry with the ability to connect DoD and intelligence community (IC) personnel, Government IT decision-makers, thought leaders and industry and vendor partners. At this year\u2019s conference, leaders and operators in the IT and Defense Department joined to network, facilitate problem solving and explore ways to expedite and secure the procurement process.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"299\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-12-1.jpg\" alt=\"\" class=\"wp-image-10615\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-12-1.jpg 400w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-12-1-300x224.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Expanding Zero Trust: \u201cFlank Speed\u201d is Ready to Scale\u00a0<\/h2>\n\n\n\n<p>To safeguard against potential cybersecurity attacks, the DoD is working to secure its networks with Zero Trust, a security strategy focused on identity, credential and access management. In the session \u201cDoD Zero Trust Success Stories,\u201d David Voelker, Zero Trust Architecture Lead for the Department of the Navy, discussed recent initiatives to bolster Zero Trust within Flank Speed, the Navy\u2019s single enterprise <a data-track=\"Carahsoft - TechNet Cyber - 2025 - Microsoft\" href=\"https:\/\/www.office.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365<\/a> solution that provides productivity tools, collaboration tools and OneDrive storage. The Department of the Navy is planning to conduct autonomous penetration testing to determine the quality of Zero Trust capability implementation. Last year Flank Speed met 151 of 152 Zero Trust activities, meeting target far ahead of schedule. Flank Speed is the Navy\u2019s single enterprise Microsoft 365 solution that provides productivity tools, collaboration tools and OneDrive storage.<\/p>\n\n\n\n<p>Another speaker, Ian Leatherman, the Zero Trust Strategy Lead for Microsoft U.S. Federal, discussed key takeaways from <a href=\"https:\/\/www.carahsoft.com\/microsoft\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - Microsoft Microsite\" rel=\"noreferrer noopener\">Microsoft\u2019s<\/a> work with Flank Speed. Visibility into agency networks is critical to emboldening existing Zero Trust strategies. Mr. Leatherman stated, \u201cWhen in doubt, collect the telemetry: you never know what new or novel adversary techniques you may find.\u201d Knowing exactly how many endpoints, applications and users are on the network at any given time positions the DoD to swiftly deal with incoming threats.&nbsp;<\/p>\n\n\n\n<p>Leatherman also discussed recent initiatives to involve all Navy personnel in a cybersecurity strategy; security is more than a technology solution, but a way to ensure safety within the agency. David Voelker, Zero Trust Architecture Lead at the Department of the Navy echoes this statement. While the Zero Trust Portfolio Office set their DoD-wide Zero Trust adoption target as the end of fiscal year 2027, Flank Speed is already operational. Voelker notes that the Flank Speed configuration could be lifted and shifted to other customers in the DoD, with a quick deployment time of under 24 hours. Mr. Voelker also recommends automating this shift.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Carahsoft and our vendor partners offer several cybersecurity solutions to help Government agencies implement <a href=\"https:\/\/www.carahsoft.com\/solve\/zero-trust\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - Zero Trust Solve\" rel=\"noreferrer noopener\">Zero Trust<\/a> architectures that protect critical information and reduce national security risk. Our offerings align with Public Sector Zero Trust maturity models developed by NIST, the DoD and CISA.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-blog-300-18.jpg\" alt=\"Carahsoft, TechNet, blog, embedded image, 2025\" class=\"wp-image-10592\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-blog-300-18.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-blog-300-18-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">How Mission Objectives Drive Acquisition\u00a0\u00a0<\/h2>\n\n\n\n<p>Acquiring powerful, up-to-date technology enables the DoD to protect against persistent and increasingly sophisticated cyber-attacks. The DoD aims to streamline its procurement process to maintain pace and safeguard against attacks. In the session \u201cDoD Software Modernization Senior Steering Group,\u201d speaker Sean Brady, Senior Lead for Software Acquisition Enablers at the Office of the Undersecretary of Defense (Acquisition and Sustainment), explained that there are two key drivers to this transformation. The first is mission objectives; software should be tailored to allow the DoD to adapt its systems to rapidly changing threats. The second is access to commercial innovation, which allows the DoD to access products in weeks or months rather than years.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator aligncenter has-alpha-channel-opacity is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-9-1.jpg\" alt=\"\" class=\"wp-image-10619\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-9-1.jpg 400w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-9-1-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Digital Transformation for Operational Effectiveness\u00a0<\/h2>\n\n\n\n<p>Digital transformation in the DoD is crucial for maintaining pace with an increasingly technology-driven security environment. Thomas W. Simms, Principal Deputy Executive Director for Systems Engineering and Architecture at the Office of the Under Secretary of Defense for Research and Engineering, discussed the major digital transformation efforts within the DoD.&nbsp;<\/p>\n\n\n\n<p>The main four are:&nbsp;<\/p>\n\n\n\n<ol start=\"1\">\n<li><a href=\"https:\/\/www.cto.mil\/wp-content\/uploads\/2025\/03\/MOSA-Info-Sheet-Cleared-20250314.pdf\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - MOSA\" rel=\"noreferrer noopener\">Modular Open Systems Approach (MOSA)<\/a>, a congressional requirement that integrates technical and business strategies to promote acquisition and drives modular designs&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\">\n<li>The DoD\u2019s <a href=\"https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodi\/500097p.PDF?ver=bePIqKXaLUTK_Iu5iTNREw%3d%3d\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - Digital Engineering Instruction\" rel=\"noreferrer noopener\">Digital Engineering Instruction<\/a>, which requires programs to use digital engineering in their design process&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\">\n<li>Application Program Interfaces (APIs), a ruleset that allows communication between software applications and is driven by the DoD\u2019s <a href=\"https:\/\/www.cto.mil\/wp-content\/uploads\/2023\/11\/API-Guide-2023.pdf\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - API Guidebook\" rel=\"noreferrer noopener\">API <\/a>guidebook, which enables the DoD to become more data-centric&nbsp;&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\">\n<li>The DoD\u2019s <a href=\"https:\/\/ac.cto.mil\/wp-content\/uploads\/2022\/02\/Systems-Eng-Guidebook_Feb2022-Cleared-slp.pdf\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - System Engineering Guidebook\" rel=\"noreferrer noopener\">System Engineering <\/a>Guidebook, which is currently undergoing an update to incorporate guidance from the Secretary of Defense\u2019s latest memos&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>By modernizing legacy systems and enabling the DoD to acquire the newest and greatest in IT, these initiatives enhance operational effectiveness and improve decision-making speed.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"291\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-13-1.jpg\" alt=\"\" class=\"wp-image-10617\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Fast-Tracking Authority to Operate (ATO)\u00a0<\/h2>\n\n\n\n<p>In the defense industry, technology must be approved to mitigate security risks. The <a href=\"https:\/\/www.defense.gov\/News\/Releases\/Release\/Article\/4174350\/software-fast-track-initiative\/\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - SWFT\" rel=\"noreferrer noopener\">Software Fast Track (SWFT),<\/a> a process that expedites software verification within the U.S. Government, is changing the way the DoD manages risks and conducts Authority to Operate (ATO). Contractors can get involved with the latest software acquisition and risk management changes by participating in the three recently released requests for information (RFIs).&nbsp;&nbsp;<\/p>\n\n\n\n<p>These RFIs, which close May 20<sup>th<\/sup>, are:&nbsp;<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sam.gov\/opp\/753c9598b7904657b528e9de39efdee8\/view\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - RFI SWFT\" rel=\"noreferrer noopener\">RFI \u2013 Software Fast Track (SWFT) Tools<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sam.gov\/opp\/4a79c3e777c24d14a69d6c090950a755\/view\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - SWFT External Assessment\" rel=\"noreferrer noopener\">RFI \u2013 Software Fast Track (SWFT) External Assessment Methodologies<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sam.gov\/opp\/7ca9ff30bad5407db7de079f7bf397c0\/view\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - SWFT Automation\" rel=\"noreferrer noopener\">RFI \u2013 Software Fast Track (SWFT) Automation &amp; Artificial Intelligence (AI)<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Katie Arrington, the Acting DoD Chief Information Officer (CIO), also discussed the <a href=\"https:\/\/www.defense.gov\/News\/Releases\/Release\/Article\/4174350\/software-fast-track-initiative\/\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - SWFT News\" rel=\"noreferrer noopener\">Software Fast Track (SWFT)<\/a> set to launch on June 1<sup>st<\/sup> of this year. The initiative will replace the traditional Authority to Operate (ATO) structure and add a few requirements, such as third-party Software Bill of Materials (SBOM), third-party risk assessments and the population of Enterprise Mission Assurance Support Service (eMASS) with artifacts. Once these guidelines are in place, contractors will gain a Provisional ATO.&nbsp;<\/p>\n\n\n\n<p>Ms. Arrington attests that these changes will revolutionize the Risk Management Framework (RMF) by allowing industry experts to provide feedback to the DoD. Paper compliance isn\u2019t enough anymore, Ms. Arrington says. The DoD is looking for \u201ccontinuous monitoring, red-teaming and people to continually evaluate their capability.\u201d&nbsp;&nbsp;<\/p>\n\n\n\n<p>She also added that the DoD will be sunsetting the Approved Products List (APL). Additional sponsor additions are no longer being accepted. Instead, the SWFT initiative will take over, establishing a \u201ctrust, but verify\u201d procedure, promoting both security and swift ATO action.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"303\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-10-1.jpg\" alt=\"\" class=\"wp-image-10614\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-10-1.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/Image-10-1-297x300.jpg 297w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Using Interoperability to Pitch to DoD\u00a0<\/h2>\n\n\n\n<p>As operations increasingly move online, interoperability becomes increasingly important to efficiency and accessibility. Venice Goodwin, the outgoing CIO for the Department of the Air Force, offered advice to industry professionals on navigating changes within DoD. Goodwin recommends that the industry practice \u201cextreme teaming;\u201d rather than service each department individually: vendors should focus on servicing the DoD as a whole. As the DoD prioritizes capabilities that have cross-departmental benefits, industry experts should demonstrate the effectiveness of their capabilities and solutions in every domain across land, sea, air and space. With this collaboration, both the Private and Public Sector can get the results they need. <\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p>The digital transformation journey within the Department of Defense represents not just an evolution of systems, but a commitment to defending interests at home and abroad. Acquisition, ATO and Zero Trust are all valuable assets to maintaining pace with the current, constantly evolving technological climate, ensuring the United States carries out its mission of protecting the nation.&nbsp;<\/p>\n\n\n\n<p><strong><em>To learn more about mission-critical technology, visit <a href=\"https:\/\/www.carahsoft.com\/markets\/defense\" target=\"_blank\" data-track=\"Carahsoft - TechNet Cyber - 2025 - Markets Page\" rel=\"noreferrer noopener\">Carahsoft\u2019s defense portfolio<\/a> to explore solutions showcased at TechNet Cyber. For additional research into the key takeaways that industry and Government leaders presented at TechNet Cyber, view Carahsoft\u2019s <a href=\"https:\/\/www.carahsoft.com\/learn\/resource\/25116-technet-cyber-2025#resources\">full synopsis<\/a> of key sessions from the tradeshow.\u202f&nbsp;<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology is a vital part of the United States Department of Defense (DoD)\u2019s capabilities, making security and enhancements essential to the nation&#8217;s stability and growth. AFCEA International\u2019s flagship event, TechNet Cyber, emphasizes the role of cybersecurity and IT within the &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":10594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1248,952],"tags":[545,196,611,1589,443],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More | Carahsoft<\/title>\n<meta name=\"description\" content=\"TechNet Cyber explores the role of cybersecurity and IT within the DoD, including Zero Trust architecture and interoperability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"TechNet Cyber explores the role of cybersecurity and IT within the DoD, including Zero Trust architecture and interoperability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-09T23:23:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T13:41:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"nhamad@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nhamad@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\"},\"author\":{\"name\":\"nhamad@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/56e77e883ba09ef2323db913ff10d09a\"},\"headline\":\"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More\u00a0\",\"datePublished\":\"2025-05-09T23:23:51+00:00\",\"dateModified\":\"2025-05-16T13:41:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\"},\"wordCount\":1297,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg\",\"keywords\":[\"Cybersecurity\",\"Department of Defense\",\"Federal Government\",\"Interoperability\",\"Zero Trust\"],\"articleSection\":[\"Cybersecurity\",\"Department of War\",\"Zero Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\",\"name\":\"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg\",\"datePublished\":\"2025-05-09T23:23:51+00:00\",\"dateModified\":\"2025-05-16T13:41:04+00:00\",\"description\":\"TechNet Cyber explores the role of cybersecurity and IT within the DoD, including Zero Trust architecture and interoperability.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg\",\"width\":875,\"height\":635,\"caption\":\"Carahsoft, TechNet Cyber, preview image, blog, 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/56e77e883ba09ef2323db913ff10d09a\",\"name\":\"nhamad@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36195ecef2f9156bf00445febf23e892?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36195ecef2f9156bf00445febf23e892?s=96&d=mm&r=g\",\"caption\":\"nhamad@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More | Carahsoft","description":"TechNet Cyber explores the role of cybersecurity and IT within the DoD, including Zero Trust architecture and interoperability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More | Carahsoft","og_description":"TechNet Cyber explores the role of cybersecurity and IT within the DoD, including Zero Trust architecture and interoperability.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-05-09T23:23:51+00:00","article_modified_time":"2025-05-16T13:41:04+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg","type":"image\/jpeg"}],"author":"nhamad@carahsoft.com","twitter_misc":{"Written by":"nhamad@carahsoft.com","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/"},"author":{"name":"nhamad@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/56e77e883ba09ef2323db913ff10d09a"},"headline":"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More\u00a0","datePublished":"2025-05-09T23:23:51+00:00","dateModified":"2025-05-16T13:41:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/"},"wordCount":1297,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg","keywords":["Cybersecurity","Department of Defense","Federal Government","Interoperability","Zero Trust"],"articleSection":["Cybersecurity","Department of War","Zero Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/","name":"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg","datePublished":"2025-05-09T23:23:51+00:00","dateModified":"2025-05-16T13:41:04+00:00","description":"TechNet Cyber explores the role of cybersecurity and IT within the DoD, including Zero Trust architecture and interoperability.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/05\/TechNet-Cyber-2025-2-19.jpg","width":875,"height":635,"caption":"Carahsoft, TechNet Cyber, preview image, blog, 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-technet-cyber-tradeshow-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/56e77e883ba09ef2323db913ff10d09a","name":"nhamad@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36195ecef2f9156bf00445febf23e892?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36195ecef2f9156bf00445febf23e892?s=96&d=mm&r=g","caption":"nhamad@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10579"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=10579"}],"version-history":[{"count":18,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10579\/revisions"}],"predecessor-version":[{"id":10640,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10579\/revisions\/10640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/10594"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=10579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=10579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=10579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}