Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department’s complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met.
Join BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, DISA, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.
These cybersecurity leaders will discuss:
- Why PAM is critical when developing programs like ICAM and EITaaS
- How Zero Trust, ICAM, and Enterprise Network Modernization correlate
- The Defense Department’s outlook on Enterprise Network Modernization
- The path to secure modernization using least privilege or “just-in-time” best practices
Featured Speakers:
| | |
MG Joe Brendler US Army (Ret.) | Josh Brodbent Senior Public Sector Security Director, BeyondTrust | Stephen M. Wallace Systems Innovation Scientist, Emerging Technology Directorate, DISA |
For those seeking to strengthen your agency’s long-term immunity and resilience against cyber threats, don’t miss this session!