-
ICYMI: Federal CIO Suzette Kent outlines federal government's zero-trust progress https://hubs.ly/H0mS9CW0 by
@TajhaLanier#DuoFedSummit pic.twitter.com/QxuGvfMreU
-
We're here at
@ScoopNewsGroup's Zero Trust Summit! Thank you@Fedscoop and@IntlSpyMuseum for hosting an enlightening event on the latest of federal security and IT environments modernization utilizing#zerotrust principles!#DuoFedSummit pic.twitter.com/aj0RGNVOQk
-
"We’re really getting agencies to act as one when it comes to
#IT acquisition.” – Bill Zielinski, Assistant Commissioner for GSA's Office of Information Technology Category, speaking at the@fedscoop Zero Trust Summit this morning.#DuoFedSummit@GSA_ITC#DuoFedSummit pic.twitter.com/erthVto2TO
-
WATCH: Ms. Spinks final takeaway at the
#duofedsummit.#ZeroTrustpic.twitter.com/Lc3ibgNnYE -
Renata Spinks of
@MARFORCYBER reminds the#duofedsummit that "the enemy gets a vote" when it comes to making decisions about securing networks. pic.twitter.com/QsOu4WLna9
-
.
@MARFORCYBER's Renata Spinks@CyberBosslady at@CyberScoopNews#DuoFedSummit: "The adversary is either always scanning your networks or viewing your data — whether that’s FB...LinkedIn...Twitter...The ability to aggregate that info is why the zero trust model is so important." -
Bill Zielinski of
@USGSA talking about the effects of new tech like 5G: If he were leading a small agency, "I would really be tempted to think about getting rid of all my hard network infrastructure," because 5G could be a replacement tech, not just an additive one.#DuoFedSummit pic.twitter.com/3ZEy37zCGr
-
Love hearing about the “past” cyber tech work Bill Zielinski is working on vs. the “future” work his college-aged kids do - already
#ZeroTrust#DuoFedSummit@duosec@fedscoop@CyberScoopNews@GSA_ITC@USGSApic.twitter.com/1NPzB9fHWF
-
“At GSA, when we think about identity we see it as a
#sharedservice.” – Phil Lam, GSA's Executive Director of Identity, speaking at the@FedScoop Zero Trust Summit this morning.#DuoFedSummit pic.twitter.com/zubpwT6nNp
-
"'Fast and cheap' is king, and passwords play into that,"
@DHSgov CISO Paul Beckman says. Thinking about better forms of security runs counter to that habit, he says.#DuoFedSummit pic.twitter.com/W5p7Il5Nfr
-
“FIDO is the biggest security infrastructure innovation since SSL” says
@seanfsez at#duofedsummit Panel with@Yubico and@DHSgov CISO.@FIDOAlliancepic.twitter.com/ywurxaGFsR
-
No doubt the first use of Sexual Chocolate I’ve ever seen in a cybersecurity speech. This really should happen more often. Well played
@seanfsez.#DuoFedSummit pic.twitter.com/sHfiU9b4vn
Prikaži ovu nit -
Sean Frazier of
@duosec on the rapid rise of interest in zero-trust technology in the federal government: Two years ago the conversation was "10 people in a room with cigars and bad coffee," and now it's the standing-room-only#duofedsummit pic.twitter.com/ihEXxE75gG
-
When it comes to pushing agencies toward adopting zero-trust tech, part of OMB's job is convincing them that "taking this journey is really a part of achieving their mission," says the Office of the Federal CIO's chief of staff, Jordan Burris.
#DuoFedSummit pic.twitter.com/jv75FOcLWx
-
The great
@AlanBalutis uses a throwback to President Reagan “trust but verify” as he leads a thoughtful discussion on protecting the digital infrastructure at@duosec@fedscoop@CyberScoopNews#DuoFedSummit pic.twitter.com/JOlhMmnCBn – mjesto: International Spy Museum
-
CAC and PIV are effective - but so are newer authentication approaches like
@FIDOAlliance standards - so let’s use them! (says@pgrassi at#DuoFedSummit) pic.twitter.com/y8TmARYnZc
-
Agencies have made "significant progress" in adopting multi-factor authentication for users on their networks, Federal CIO
@SuzetteKent45 says.#duofedsummit pic.twitter.com/AyvFXwULad
-
The three pillars of Zero Trust: Workforce, Workplace, Workload. —
@dugsong at#DuoFedSummit@fedscoop@CyberScoopNews#ZeroTrustpic.twitter.com/wJuzsg1dMT
-
“The new perimeter is anywhere an access control decision is being made” -
@dugsong#DuoFedSummit -
.
@dugsong notes that it’s been over a decade since Operation Aurora, the alleged Chinese intrusions into major tech companies like Google. The incident made clear that state-backed adversaries had “both the capabilities and intent to go after civilian targets.”#DuoFedSummitPrikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.