Access Management , Critical Infrastructure Security , Digital Identity

ISMG Editors: Zero Trust Special

Father of Zero Trust John Kindervag Joins Editors
Clockwise, from top left: John Kindervag, Anna Delaney and Mathew Schwartz

In the latest weekly update, John Kindervag, creator of Zero Trust and senior vice president of cybersecurity strategy at ON2IT, joins two editors at Information Security Media Group to discuss important cybersecurity issues, including whether we have advanced or regressed in security technology, implementing Zero Trust security in OT environments, and how federal agencies are progressing with Zero Trust adoption a year since President Biden's cybersecurity executive order was issued.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

The panelists - Anna Delaney, director, productions; John Kindervag, creator of Zero Trust and senior vice president of cybersecurity strategy, ON2IT; and Mathew Schwartz, executive editor, DataBreachToday & Europe - discuss:

  • Areas in which the security industry is advancing and areas in which it is regressing;
  • The challenges of implementing Zero Trust in an ICS environment;
  • The progress U.S. federal agencies have made in adopting Zero Trust one year since President Biden's cybersecurity EO was issued.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the April 22 edition discussing the complications of regulating spyware and the April 29 edition discussing which virtual currency criminals prefer.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.