Épisodes

  • If You’re Reachable, You’re Breachable: Modernizing Defense with Zero Trust
    1 h et 12 min
  • Identity as the Core of Zero Trust
    Dec 3 2025
    Episode ten of the podcast, Identity as the Core of Zero Trust, features Dan Miller from Ping Identity, emphasizing that verifying digital identity and assessing user attributes in real time is critical before granting access to any DoD resource. He discusses the importance of using detailed attributes like location, device, and role instead of relying on simple logins to make smarter, real-time access decisions, which is crucial for secure operations in classified and remote environments. Since many DoD units work in disconnected settings, Ping Identity provides local identity solutions that keep missions running and sync with the cloud when reconnected. This episode explores how, in joint missions, enforcing secure data sharing through identity-driven access and tagging paves the way for granular Zero Trust.
    Afficher plus Afficher moins
    46 min
  • These Guys Literally Wrote the Book
    Sep 15 2025
    Episode nine of the podcast, These Guys Literally Wrote the Book, features Rob Freter and Joe Brinker from True Zero Technologies, delving into the evolving implementation of Zero Trust principles across the Department of Defense, the Defense Industrial Base, and the broader federal government. They discuss the importance of starting with a clear problem statement and solution, emphasizing the cultural and practical need for a structured approach to security, including policy enforcement points (PEPs). Drawing analogies to cinematic sequels like The Godfather Part II, the episode explores how Zero Trust architectures have evolved to be even better with their second iterations, offering cleaner lines and easier readability.
    Afficher plus Afficher moins
    56 min
  • Thinking Tactically
    Jul 14 2025
    In this episode of Zero Trusts Given, hosts Tom Tittermary and Tom Gianelos are joined by Jared Shepard, CEO of Hypori, to discuss redefining device security and enabling Zero Trust in edge environments. Jared introduces Hypori’s virtual mobile operating system, which eliminates data at rest and transit on edge devices by streaming encrypted pixels securely, allowing users to work from compromised or personal devices without risk to enterprise systems. This approach enables agility in BYOD, tactical missions, and mission partner environments, simplifying access while maintaining strong security posture. Jared also discusses the importance of a defense-in-depth approach, avoiding reliance on single vendors, and improving downstream supply chain security to protect critical infrastructures. The episode concludes with a heartfelt discussion about Jared’s nonprofit, Warrior’s Ethos, which supports veterans transitioning from military service by providing mentorship, resources, and job support. He encourages listeners to volunteer, hire veterans, and help ease their transition into civilian opportunities. This episode is perfect for tech enthusiasts, cybersecurity professionals, and anyone interested in understanding how Zero Trust is transforming the defense landscape. Tune in to gain valuable insights from leading experts on the forefront of innovation and cybersecurity policy in the DoD!
    Afficher plus Afficher moins
    56 min
  • Strategies with How to Eat an Elephant
    Jun 24 2025
    In this episode of Zero Trust Given, hosts Tom Tittermary and Tom Gianelos chat with Jean-Paul (JP) Bergeaux, CTO of GuidePoint Federal, about implementing Zero Trust in government and DoD environments. They explore key challenges, such as tackling the data pillar, breaking down silos between teams, and automating risk-based decision-making. JP emphasizes the importance of starting small with achievable wins, leveraging existing tools, and taking an iterative approach. He shares how his team helped a DoD agency make significant progress without new tech, showing that Zero Trust is more about collaboration, strategy, and mindset than an overnight overhaul. Zero Trust is a journey of gradual improvement that integrates security into everything while supporting mission effectiveness. This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders, and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
    Afficher plus Afficher moins
    51 min
  • The Conrad
    Jun 10 2025
    This episode, featuring hosts Tom Tittermary and Tom Gianelos with special Zscaler guest Conrad Maiorino, explores how Zero Trust eliminates network access points by making applications unreachable, as opposed to traditional security. They discuss Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA), which are used for secure, mutually authenticated user-to-application tunnels, disrupting adversary tactics. The discussion highlights Zscaler's solution for "Denied, Deprecated, Intermittent or Low Bandwidth" (DDIL/CDOL) scenarios, ensuring secure access even without constant cloud connectivity. The speakers also cover integrating Zscaler with identity providers for policy building based on user attributes and why this Zero Trust security is valuable for the DoD and other critical sectors like hospitals and manufacturing. This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
    Afficher plus Afficher moins
    54 min
  • Drowning in Data
    May 28 2025
    It can be daunting to think of the amount of data held by the Federal Government and specifically the DOD. Considering that a full zero trust implementation would mean tagging every piece, regardless of if it is a file, or in a database, we wonder how we could ever get there. Throw into the mix that every day more data is being generated than there is capacity for humans to tag that data effectively. What is there to do? How can we clear the backlog and create new methodologies to tag data effectively in line? Listen this week for some ideas and directions on the matter.
    Afficher plus Afficher moins
    48 min
  • Needle in the Haystack
    May 19 2025
    During this episode, David Pearson from ServiceNow joins hosts Tom Tittermary and Tom Gianelos to discuss the process of analyzing and simplifying large amounts of data, and how to make decisions based on the data collected. They also touch on the different Zero Trust Pillars. This episode is perfect for anyone interested in better understanding data management and the complexities of implementing Zero Trust in large organizations. Tune in today to discover actionable insights on leveraging data for Zero Trust and fortifying your organization's security!
    Afficher plus Afficher moins
    44 min