The large cyber espionage campaign by a nation-state targeting federal agencies and private industry underscores the need for new approaches to cyber defense. A lighter approach to security from a compliance, licensing, and procedures perspective is needed. This will make it easier to implement new security disciplines and their related solutions, such as Trusted Internet Connection (TIC) 3.0 and Zero Trust Security, as well as shorten the time to receive an Authority to Operate.
TIC 3.0 is designed to fit with other federal initiatives such as Continuous Diagnostics and Mitigations (CDM) and the National Institute of Standards and Technology (NIST) Zero Trust Architecture. Because TIC 3.0 divides agency architectures by trust zones, now is the right time for agencies to start building out their Zero Trust strategy. Zero Trust can offset vulnerabilities and threats across federal networks by creating discrete, granular access rules for specific applications and services within a network. However, recent attacks have shown that widespread vulnerabilities in the software of supply chain partners can create backdoors, escalating risk exposure across multiple agencies and industries.
This webinar will examine how agencies can implement TIC 3.0 and Zero Trust, as well as apply supply chain security, into a modern landscape where the network perimeter has become more difficult and costly to defend.
Please join AFCEA Bethesda on February 23, 2021 as federal IT security leaders and decision-makers discuss innovative ways agencies and cyber defense partners can defend their infrastructures from both external and internal threats.