Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top Page Results

See all search results

Featured Solutions
What's trending
?
Home
Solutions & Services
Solutions
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Research
About
Footer Links
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
Public Sector Zero Trust Security Transformation

Webinar

Public Sector Tech Talk E05: Adopting Zero Trust in Support of the Cyber Executive Order

  • Details
  • Select an Option

Event Overview

The Biden Administration's Cyber Executive Order (EO), officially released on May 12, lays out a multi-pronged approach on how to fortify federal agency cybersecurity efforts and mitigate the large-scale, damaging attacks felt across the country. The Cyber EO provides direction, now it's up to each agency to develop a cohesive strategy. Zero Trust is a concept highlighted in the EO and one that will need to be part of any agency strategy, but is there a consensus on what this means or how to achieve it? In this Public Sector Tech Talk, WWT and F5 will discuss how federal agencies need to move away from traditional network perimeter defense tactics to a perimeter-less data environment that uses identity and authentication tools as the primary means of access in a centralized, controlled Zero Trust framework.

Featured Speakers

John Evans

World Wide Technology

Chief Technology Advisor

Evans engages with clients on strategy, innovation and transformation to develop and deliver solutions for business in government and education. He is a highly consultative and knowledgeable technology advisor focused on achieving tangible operational and business outcomes for WWT's customers at enterprise scale. Evans brings over 15 years of technology expertise with extensive experience with security, cloud, and mission critical applications with a primary focus on the SLED market.
Corey Marshall

F5 Networks

Director of Solutions Engineering

Marshall applies 20+ years of global experience in a range of domains including secure network and platform design, digital forensics and surveillance, incident response, regulatory compliance, and vulnerability assessment/penetration testing to the challenges and opportunities facing F5's clients. He currently focuses on web and mobile application security strategies and is recognized as one of F5's leading experts in Zero Trust architectures.

Goals and Objectives

After viewing this episode, you will have a better understanding of how a Zero Trust approach to security will help strengthen the federal government's cyber posture as well as the importance of focusing on the four key control points within a Zero Trust architecture.

Who should attend?

Public sector IT professionals looking to learn about emerging technologies and drivers shaping the future of government. This series is geared towards those that are developing and executing solutions that address the unique challenges faced by government agencies. In this case, a focus on Zero Trust.

Invite people to join this event

© World Wide Technology. All Rights Reserved
  • About
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies