Privileged Access Management is Essential to Zero Trust

A Candid Discussion with Government Cybersecurity Experts

With cyberattacks growing in number and sophistication, and with recent attacks targeting U.S. critical infrastructure and national security systems, protecting data from malicious actors has become a matter of national security. The White House has responded by issuing an Executive Order that requires all agencies to move towards a Zero Trust security posture.

Privileged Access Management (PAM) marks one potential pathway towards achieving the Zero Trust mandate to "never trust, always verify," a principal that is critically important to the protection of agency systems while enabling the access and usability demands of modern users.

In this expert dialogue, you'll gain insights into the government cybersecurity landscape - and how privileged access management can be used to mitigate risk - from the following cybersecurity experts:

  • Mike Witt - Senior Agency Information Security Officer and Chief Information Security Officer, National Aeronautics and Space Administration

  • Gerald Caron - Chief Information Officer / Assistant Inspector General for Information Technology, U.S. Department of Health and Human Services, Office of the Inspector General

  • Jeremy Wilson - Deputy CISO for Security Operations, State of Texas Department of Information Resources

Download the expert dialogue to learn more!

Underwritten by

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms and Conditions apply.

Disclaimer

IMPORTANT NOTICE
Any information you supply is subject to our privacy policy. Access to this report is available to registered members at no cost. In order to provide you with this free service, Government Executive Media Group may share member registration information with underwriters and partners.