Modernizing and strengthening federal cybersecurity standards is at the heart of Presidential Order 14028. The order mandates the use of specific capabilities such as multifactor authentication and encryption. It also directs federal agencies to adopt a Zero Trust security architecture.
Zero Trust can mean many different things to different people. Just about everyone agrees that Identity, Credentialing, and Access Management (ICAM) is a key component of Zero Trust.
In this webinar recording, representatives from Saviynt, Microsoft, and OCG Federal discuss the key tenants of an effective ICAM program. Based on project experience with a DoD agency, they also examine how ICAM is helping the agency meet strategic goals, including initiatives around Unified Networks.
- Eliminate implicit trust and adopt continuous verification.
- Implement granular, risk-based controls and security automation to protect data and infrastructure from threats in real-time.
- Apply the principle of least privilege for every access decision. Deny access to resources based on the combination of several risk attributes.
Taylor Campos, Identity and Security Architect, Microsoft
Mark Riley, Principal Architect, Oxford Computer Group
Andrew Whelchel, Senior Solutions Engineer, Saviynt
Read more about the importance of a strong ICAM program in our recent blog post, “Identity, Credentialing, and Access Management (ICAM) in a Unified Network.”