Identity: The First Pillar of Zero Trust

Zero trust is vital for our nation’s cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn’t have to be. 

In this engaging session, you’ll learn: 

  • Why Identity is Pillar #1
  • How Identity informs your entire Zero Trust Architecture 
  • The Identity maturity stages and how to transform your agency from Traditional to Optimal

Don't miss your chance to learn more about the first pillar of Zero Trust, Identity!



Request Free!