DoD SAP IT & Cybersecurity 2020 Summit
August 30 - September 3
Exhibiting at table 39
Breakout Session: Zero Trust – Protecting Data at the Source presented by CTO Jonathan Halstutch
March 26th 10:30am
A concerted effort must be made to protect critical sensitive data and not just the network. The data is what an adversary is trying to steal and manipulate. A zero trust approach to data security doesn’t rely on a trusted core like traditional approaches. Instead, zero trust strives to improve data security and reduce complexity. This approach can be leveraged by a project or organization of any size and ensures continuous compliance with guidelines such as the JSIG/RMF and CMMC.