Zero trust is vital for our nation’s cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, Cybersecurity and Infrastructure Security Agency (CISA) drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated— but it doesn’t have to be. In this engaging session, you’ll learn: