Grant M. Schneider
Federal Chief Information Security Officer
Office of Management and Budget
Getting to a zero trust environment in federal IT will require weaving together new and traditional risk-mitigation tools, strategies and policies, from Identity Credential and Access Management (ICAM) and Supply Chain Risk Management (SCRM) to Continuous Diagnostics and Mitigation (CDM) and Trusted Internet Connections (TIC), among others. In this session, learn how the Office of Management and Budget’s cybersecurity policies and the work of the Federal Acquisition Security Council support development and deployment of zero trust cybersecurity.
Click on the image above to launch the video player.
To download the video: Right Click Link and Save As | Download the Video