cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Ponte manos a la obra con la plataforma Netskope
          Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
                Prevención de pérdida de datos (DLP) moderna para dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
                  Libro SD-WAN moderno para principiantes de SASE
                  SD-WAN moderna para maniquíes SASE
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access es la única solución que le permite retirar su VPN para siempre.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Hagamos grandes cosas juntos
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) proporciona a los clientes potentes herramientas de integración para aprovechar las inversiones en su postura de seguridad.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      The Essential Steps of a Successful Zero Trust ‘Journey’ for Federal Agencies

                                      Oct 07 2022

                                      By Nate Smolenski

                                      In May, the National Institute of Standards and Technology (NIST) released the white paper, “Planning for a Zero Trust Architecture,” which illustrates how agencies can make this transition by leveraging the seven steps of the NIST Risk Management Framework (RMF): Prepare, categorize, select, implement, assess, authorize, and monitor.

                                      “Zero Trust is not a single technology solution,” the paper states, “but a larger cybersecurity strategy and operational practice … [which] also requires the involvement of those who may not traditionally provide input on the risks to their charges. This input is vital; zero trust is a holistic approach to enterprise cybersecurity and requires support from managers, IT staff and general enterprise users.”

                                      I wholeheartedly agree that effective across-the-board collaboration is needed for a successful transition to a zero trust architecture (ZTA). Most recently, I had the opportunity to discuss this along with other concepts from the paper and related topic points during a podcast with Verizon called “Securing the Homeland with Zero Trust.” While our podcast primarily focused on Department of Homeland Security (DHS) challenges, any government agency could benefit from the following additional steps – which also support RMF – and insights:

                                      Commit to a cultural change. NIST SP 800-207 calls for the establishment of a ZTA governance policy and structure that allows the performance of authorized operations only after sufficient identity authentication. Teams should always consider the network as contested, while assuming that attackers are present.

                                      This speaks to profound, ongoing changes that are impacting a range of IT cultural components: In the past, for example, everything revolved around the data center. But the users are the center of the universe now. They are digital natives who insist on using their own devices and tools for work. We have to accommodate them while applying ZTA to ensure a productive but protected environment.

                                      The cultural change needs to include the addressing of legacy systems as well. Some agencies may cling to these anchors, even if they encourage counter-productive and potentially vulnerable silos. To move beyond this, security leaders should work with operations and business leaders in a spirit of complete collaboration. This is a major shift and everyone must get involved to determine if we “rip and replace” legacy technologies entirely or if we augment them so they fit into the new strategy.

                                      Assess where you are. A comprehensive assessment will reveal where your agency is–and where it needs to be–to reach your targeted ZTA maturity level. Fortunately, government leaders are not starting from scratch. In fact, about one-half of agencies have a formal ZTA strategy in place and are actively implementing it, and nearly four of five federal cybersecurity decision-makers feel a “strong” sense of urgency in implementing ZTA.

                                      Incorporate agility. The risk management component of ZTA is not a “one and done/set it and forget it” endeavor. We should seek to continuously improve and adapt risk management to the realities that employee-users in the field are facing. By applying an agile approach to every step and process of risk management, you are combining enhanced visibility, data-driven insights, orchestration, and automation to enable better decision-making that acknowledges the constantly changing requirements of the mission, and supports them.

                                      I enjoyed taking part in the Verizon podcast, in which we expanded upon these and additional related topics. So I hope you get a chance to listen to it. (Best of all: It’s brief, at just over 13 and a half minutes!) Toward the end, I reiterated that the pursuit of risk management and ZTA is a journey. It is not bound to any finite timeline. It should continuously evolve as your agency evolves.

                                      A commitment to collaboration will only help ensure a successful journey. At Netskope, we work closely with our government customers every day to address their cybersecurity challenges as partners. If you’d like to learn more, please contact us.

                                      Nate Smolenski is the CISO and Head of Cyber Intelligence Strategy at Netskope.

                                      author image
                                      Nathan Smolenski
                                      Nathan is an experienced CISO & risk management and tech leader with over 19 years across financial services, mgmt.. consulting, insurance, and software verticals.
                                      Nathan is an experienced CISO & risk management and tech leader with over 19 years across financial services, mgmt.. consulting, insurance, and software verticals.

                                      ¡Mantente informado!

                                      Suscríbase para recibir lo último del blog de Netskope