Scroll Down

Adopting a Zero Trust architecture in Government

Closed captions in English can be accessed in the video player.

Share this page


Speaker headshot

John Lewington
Industry Specialist, National Security Group, Adobe

Speaker headshot

Sean Connelly
TIC Program Manager, CISA 

Speaker headshot

John MacKinnon
Worldwide Public Sector Partner Development and Global Telecom Alliances Manager, Amazon Web Services

Speaker headshot

Greg Landrum
Senior Manager, Government and Public Sector, Deloitte Consulting

About the session

Over the last year, many government organizations have accelerated their digital transformation, moving business and services environments beyond the traditional defined security perimeter. As a result, the traditional perimeter-style security architecture needs to be rethought. This has given rise to new defense-in-depth architectures, like Zero Trust, that decouple network access from application and data access, allowing you to gain better control over each layer regardless of where your customers or users reside. In this session, we’ll discuss how to further secure the workforce, enhance protection for apps and data (for example, high-value assets, personally identifiable information, etc.), and safeguard supply chain information. We’ll share ideas for how government organizations can begin to adopt an integrated Zero Trust architecture approach through Trusted Internet Connections (TIC) 3.0, Continuous Diagnostics and Monitoring (CDM), and other Department of Defense (DoD) initiatives.

This content is copyrighted by Adobe Inc. Any recording and posting of this content is strictly prohibited.

Featured products

Experience Manager Assets

Learn more

RELATED content

Please wait while content is loading.