エピソード

  • Thinking Tactically
    2025/07/14
    In this episode of Zero Trusts Given, hosts Tom Tittermary and Tom Gianelos are joined by Jared Shepard, CEO of Hypori, to discuss redefining device security and enabling Zero Trust in edge environments. Jared introduces Hypori’s virtual mobile operating system, which eliminates data at rest and transit on edge devices by streaming encrypted pixels securely, allowing users to work from compromised or personal devices without risk to enterprise systems. This approach enables agility in BYOD, tactical missions, and mission partner environments, simplifying access while maintaining strong security posture. Jared also discusses the importance of a defense-in-depth approach, avoiding reliance on single vendors, and improving downstream supply chain security to protect critical infrastructures. The episode concludes with a heartfelt discussion about Jared’s nonprofit, Warrior’s Ethos, which supports veterans transitioning from military service by providing mentorship, resources, and job support. He encourages listeners to volunteer, hire veterans, and help ease their transition into civilian opportunities. This episode is perfect for tech enthusiasts, cybersecurity professionals, and anyone interested in understanding how Zero Trust is transforming the defense landscape. Tune in to gain valuable insights from leading experts on the forefront of innovation and cybersecurity policy in the DoD!
    続きを読む 一部表示
    56 分
  • Strategies with How to Eat an Elephant
    2025/06/24
    In this episode of Zero Trust Given, hosts Tom Tittermary and Tom Gianelos chat with Jean-Paul (JP) Bergeaux, CTO of GuidePoint Federal, about implementing Zero Trust in government and DoD environments. They explore key challenges, such as tackling the data pillar, breaking down silos between teams, and automating risk-based decision-making. JP emphasizes the importance of starting small with achievable wins, leveraging existing tools, and taking an iterative approach. He shares how his team helped a DoD agency make significant progress without new tech, showing that Zero Trust is more about collaboration, strategy, and mindset than an overnight overhaul. Zero Trust is a journey of gradual improvement that integrates security into everything while supporting mission effectiveness. This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders, and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
    続きを読む 一部表示
    51 分
  • The Conrad
    2025/06/10
    This episode, featuring hosts Tom Tittermary and Tom Gianelos with special Zscaler guest Conrad Maiorino, explores how Zero Trust eliminates network access points by making applications unreachable, as opposed to traditional security. They discuss Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA), which are used for secure, mutually authenticated user-to-application tunnels, disrupting adversary tactics. The discussion highlights Zscaler's solution for "Denied, Deprecated, Intermittent or Low Bandwidth" (DDIL/CDOL) scenarios, ensuring secure access even without constant cloud connectivity. The speakers also cover integrating Zscaler with identity providers for policy building based on user attributes and why this Zero Trust security is valuable for the DoD and other critical sectors like hospitals and manufacturing. This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
    続きを読む 一部表示
    54 分
  • Drowning in Data
    2025/05/28
    It can be daunting to think of the amount of data held by the Federal Government and specifically the DOD. Considering that a full zero trust implementation would mean tagging every piece, regardless of if it is a file, or in a database, we wonder how we could ever get there. Throw into the mix that every day more data is being generated than there is capacity for humans to tag that data effectively. What is there to do? How can we clear the backlog and create new methodologies to tag data effectively in line? Listen this week for some ideas and directions on the matter.
    続きを読む 一部表示
    48 分
  • Needle in the Haystack
    2025/05/19
    During this episode, David Pearson from ServiceNow joins hosts Tom Tittermary and Tom Gianelos to discuss the process of analyzing and simplifying large amounts of data, and how to make decisions based on the data collected. They also touch on the different Zero Trust Pillars. This episode is perfect for anyone interested in better understanding data management and the complexities of implementing Zero Trust in large organizations. Tune in today to discover actionable insights on leveraging data for Zero Trust and fortifying your organization's security!
    続きを読む 一部表示
    44 分
  • Do Androids Dream of Electric Data?
    2025/05/12
    This episode of Zero Trust Given features Skip Farmer from Primer, alongside hosts Tom Tittermary and Tom Gianelos, and examines the role of AI in the Zero Trust security model. From determining access and trust levels for AI entities to the phenomenon of AI “hallucinations” that produce inaccurate information, this episode dives deep into the possibilities and challenges presented by Artificial Intelligence. This episode is perfect for cybersecurity professionals, tech enthusiasts, and anyone interested in the intersection of artificial intelligence and data security, especially with Zero Trust. Tune in today!
    続きを読む 一部表示
    1 時間 1 分
  • Zero Trusts Given: Expert Perspectives on DoD Security Strategy with Quent Strandburg & James Carnall
    51 分