Trust Starts With Visibility
So much of our world, our lives, is controlled by software. The delivery of practically all vital public services hinges on trustworthy software.
So much of our world, our lives, is controlled by software. The delivery of practically all vital public services hinges on trustworthy software.
At face value, one might not associate words like flexibility and seamless with the term zero-trust architecture. It implies that no one or thing is trusted.
Charged with keeping organizations sage, IT teams have focused on preventing and stopping risks. But zero trust security offers a whole new paradigm, one that recognizes the growing need for collaboration.
Securing IT systems can be a herculean task. The state of Oklahoma found a way to do it: Officials used a zero-trust cybersecurity model.
One of the trickiest parts of implementing zero trust is the cultural shift because it requires stakeholder departments and end users to go through more security layers.
“Words matter. And how we communicate trust — or a lack of trust — to those in our organizations impacts how people react to and receive the cyber practices and processes we’re advocating for.”
“We don’t know what the next big thing is that we will be able to do with data.”
Personal stories give data a voice and invite us to connect with those around us who are most impacted by the problem.
“Imagine the raw power of 225,000 uniquely qualified individuals who are given the tools and permission to make a health care system better.”
The average age of Washington IT employees is mid-50s. It’s a number that state CIO Bill Kehoe thinks about often.