As federal agencies accelerate their zero trust strategies, identity, credential, and access management (ICAM) has become mission-critical. The Defense Department is taking a federated approach, enabling single identities to securely span multiple systems. But with every badge, credential, and privilege comes both opportunity and risk — and the stakes couldn’t be higher.
Accelerate together — Secure by AI
Top cybersecurity experts share insights on how to outpace adversaries by using AI to your advantage.
Featuring perspectives from AWS, CrowdStrike, Palo Alto Networks, and Splunk, this e-book explores how agencies can harness AI’s potential while staying one step ahead of its risks.
How to achieve secure, mobile-first collaboration in the zero trust era
What does secure collaboration really look like in action?
There’s always tension between using the newest technology and ensuring it’s secure. In our latest e-book, we explore how federal leaders are navigating this challenge across branches and agencies.
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on August 5, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
Accelerate together: Zero trust
Are you ready to accelerate zero trust at your agency?
“You have to be able to scale across hundreds of teams, thousands of workloads,” says AWS Principal Technologist Sean Phuphanich, when discussing how to make a zero trust architecture the foundation for modernization. “That’s really where a lot of the stumbling blocks come into play because then you’re dealing with a lot of different teams, different environments, different tools.”
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data.
Building a Zero Trust Federation
Zero trust is a security paradigm whose fundamental philosophy is that every access to a resource must be explicitly verified, without assuming trust based on origin or identity. In a federated environment composed of multiple domains, ensuring zero trust guarantees for accessing shared resources is a challenge, as information on requesters is generated by their originating domain, yet requires explicit verification from the domain owning the resource.
Zero Trust Privacy Assessment and Guidance
This publication provides guidance on how to use Zero Trust in privacy implementation. It highlights the core principles of privacy and how they can align with a Zero Trust architecture, touching on privacy impact assessments (PIAs) as well.
As the world increasingly digitizes, these recommendations become all the more critical. They aren’t just about protecting privacy. Zero Trust ensures that organizations identify, locate, process, and dispose of such data with the right level of security.
Managing supply chain resilience assessment model-relevant factors and activities using an FCM-FBWM approach
Supply chain resilience is essential for companies to survive in today’s competitive market, as they face environmental and unforeseeable challenges in their supply chain. This paper aims to model and manage the factors and activities that influence supply chain resilience and how they relate to each other. This will help us devise plans for enhancing the resilience of a supply chain.
Same destination, different roadmaps: the journey to zero trust architecture
While all federal agencies are striving to reach the same place, no two agencies are taking the same path to get there. Hear from cyber leaders at the Cybersecurity and Infrastructure Security Agency, the Interior Department, the Secret Service and Verizon:
- Louis Eichenbaum, zero trust program manager at Interior
- Sean Connelly, former director of CISA’s Zero Trust Initiative
- Roy Luongo, CISO for the Secret Service
- Wes Withrow, senior client executive for cybersecurity at Verizon
