Thank you for attending!
Survey link: We value your input. Visit https://eval.dau.edu/jfe/form/SV_ePOtI66PnOCGn2K?EventID=768 to access a short survey. A certificate will be e-mailed to you which you can use to request the 1.0 CL point for this event.
Date: January 19, 2023
Time: 1:00 - 2:00 p.m. ET (10:00 - 11:00 a.m. PT)
**Due to MS Teams web event limitations, registration for this event is capped at 1,000**
You can still join the event using the link below.
Copy and paste the link below to your browser (Chrome or Edge work best) and when prompted, continue with browser
If necessary, the dial in (audio only) number is 1-571-403-9146, Conference ID 512 561 95#
MS Teams limitation for the webinar: Up to 1,000 attendees can join a Teams meeting and interact by using chat. Additional attendees can join a meeting that already has 1,000 participants but will be limited to view only (live stream of presentation but no chat capability).
Who Should Attend: Government, Military, and Industry at all levels who want to learn about the principles of zero trust and its role in innovative cybersecurity solutions.
Speaker: Mr. David Voelker
Description:Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. Programs implementing ZT need awareness of three logical components (described in National Institute of Standards and Technology (NIST) SP 800-207): the Policy Engine (PE), Policy Administrator (PA), and Policy Enforcement Points (PEP). The PE fuses information sources like: network and endpoint configurations; data tagging; user analytics; access control; and policy orchestration. The PE makes risk-based access decisions based on device, asset status, and environmental factors. It determines when access becomes an unacceptable risk. NIST SP 800-207 "Zero Trust Architecture" describes the PE as "the brain and the PE's trust algorithm as its primary thought process."A robust ZT implementation can lead to better user experience and improved cyberthreat defense. Understanding the PEP is critical for enabling automation and orchestration in ZT implementations. This session helps program offices implement their ZT strategy, starting with the PEP. It establishes a framework for ZT implementation and discusses additional PEP training/resources. Our ultimate ZT goals are mission assurance and dynamic network maneuver.Join David Voelker to better understand the DoD’s zero trust strategy and successful implementation of a critical enabling ZT capability.
Biography: Mr. David Voelker serves as the Department of Navy (DON) CIO's Lead on Zero Trust Architecture. His home command is NAVWAR SYSCOM and is the IT Standards and Systems Engineering Process Technical Warrant Holder (TWH). He has a Master of Business Administration (MBA) from Redlands University and a Certified Information Systems Security Professional (CISSP).