Today every Federal agency is working to implement zero trust. Each will begin in a unique place that is dictated by its current cybersecurity posture, cybersecurity investments, and agency missions.
Still, many questions must be answered as agencies plot their zero-trust journey. Which pillar in the Zero Trust Maturity Model is most urgent? Which data is more vulnerable to attacks? How do you find and classify the most sensitive information?
MeriTalk sat down with Justin Wilkins, director of sales engineering, public sector, Varonis, to understand how agencies can implement a data-first approach to zero trust.