Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
PITTSBURGH, Aug. 15, 2022
PITTSBURGH, Aug. 15, 2022 /PRNewswire/ -- The Software Engineering Institute (SEI) at Carnegie Mellon University is hosting Zero Trust Industry Days to share information on zero trust cybersecurity architectures in government settings. Selected providers who develop solutions for implementing a zero trust architecture will present proposals to help government agencies form a zero trust implementation that meets their mission goals, budget, and time frame at the hybrid event, which will be held August 30-31 virtually and at the SEI in Pittsburgh.
At Zero Trust Industry Days, presenters will offer proposed solutions in response to a scenario of a federal agency with finite resources needing to implement a zero trust architecture within an operating environment that includes a hybrid computing environment, multiple technology types, hybrid data storage, and a distributed, remote workforce. Proposals will focus on how agencies can comply with Office of Management and Budget (OMB) memoranda M-22-09 and M-21-31, which focus on federal cybersecurity measures.
Presenting organizations include Zscaler, Cyolo, InstaSafe, Illumio, Cimcor, 1Kosmos, Appgate, iboss, Zentera Systems, and Ericom Software. The day's events also include panel discussions on further research needs; a keynote presentation by CERT Division director and former U.S. government CISO Greg Touhill; and wrap up sessions with audience Q&A. The public will be invited to participate virtually.
Implementing a zero trust architecture that meets OMB requirements in highly regulated domains, such as the federal government, is difficult, said Tim Morrow, the SEI's technical manager of situational awareness. "Typically, commercial vendors focus on one, maybe two of the high-level concepts for zero trust," said Morrow. "This event will provide an opportunity for selected organizations to provide a more comprehensive approach to help these agencies."
The zero trust security model moves away from the risks associated with perimeter-based security by requiring authentication and authorization of every subject, asset, and workflow within an organization's information technology network or system. The approach is a set of organizational practices, not a piece of technology. A zero trust architecture is an enterprise cybersecurity plan that incorporates zero trust tenets into components specified by the National Institute of Standards and Technology (NIST) Special Publication 800-207.
By hosting Zero Trust Industry Days, the SEI aims to gather, analyze, and share foundational information as it formalizes guidance on effective zero trust implementations.
For more information or to register, visit https://www.eventbrite.com/e/zero-trust-industry-days-2022-tickets-381929018977, or email info@sei.cmu.edu.
Always focused on the future, the Software Engineering Institute (SEI) advances software as a strategic advantage for national security. We lead research and direct transition of software engineering, cybersecurity, and artificial intelligence technologies at the intersection of academia, industry, and government. We serve the nation as a federally funded research and development center (FFRDC) sponsored by the U.S. Department of Defense (DoD) and are based at Carnegie Mellon University, a global research university annually rated among the best for its programs in computer science and engineering. For more information, visit the SEI website at http://www.sei.cmu.edu.
View original content to download multimedia:https://www.prnewswire.com/news-releases/software-engineering-institute-to-host-zero-trust-industry-days-301605713.html
SOURCE Carnegie Mellon University Software Engineering Institute (SEI)
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs