Zero Trust

 View Only

Working Group Organization
CSA Support

• ZT Inquiries - [email protected]

• Erik Johnson - [email protected]

• John Yeoh - [email protected]

Research Working Group Co-chairs

• Jerry Chapman

• Jason Garbis

• Chris Steffen

Structure

The CSA Zero Trust Working Group has the following nine work streams:
 1.  Zero Trust as a Philosophy & Guiding Principles
 2.  Zero Trust Organizational Strategy & Governance
 3.  Pillar: Identity
 4.  Pillar: Device
 5.  Pillar: Network/Environment
 6.  Pillar: Applications & Workload
 7.  Pillar: Data
 8.  Automation, orchestration, visibility & analytics
 9.  Zero Trust Architecture, Implementation & Maturity Model

Expressions of interest in working group and specific workstream participation can be registered here or by sending an email to [email protected].


#ZeroTrust

Latest Discussion Posts

  • Don't forget to mark your calendar for the first meeting of the IEEE-Zero Trust Security Working Group (ZTSWG) sub-working group. Please see the attached file for details. -- Dr. Ron Martin, CPP

    2 people like this.
  • [Now Available] CSA's Certificate of Competence in Zero Trust (CCZT) 📣 The wait is over – CSA's Certificate of Competence in Zero Trust (CCZT) is now available! 📣 As the industry's first authoritative and vendor-neutral Zero ...

    3 people like this.
  • Fully agreed with Zero Trust Strategy: Deploying solutions that embed the principles of Zero Trust is the only way to protect your data and services in 2024 and beyond. Applying the mantra of verifying everything is the mindset. I am actively working ...

  • Holistic Cybersecurity is a strategy to discover every vulnerability, strengthening and protecting across the entire organization and beyond. Almost every large scale attack has been the direct result of failure to take a holistic approach. This article, ...

  • Hi All, The NSA just published Advancing Zero Trust Maturity Throughout the Data Pillar This cybersecurity information sheet (CSI) provides recommendations for maturing data security and enforcing access to data at rest and in transit, ensuring that ...

Latest Shared Files

Announcements

Upcoming Events

Current Members