Discover
Zero Trusts Given
Zero Trusts Given
Author: Tom Tittermary, Tom Gianelos
Subscribed: 0Played: 0Subscribe
Share
Description
In the complex world of Department of Defense (DoD) cybersecurity, Zero Trust has become a critical imperative. Cut through the noise and gain actionable insights with Zero Trusts Given, a podcast series dedicated to demystifying Zero Trust implementation within the DoD and broader defense community. This podcast series brings together leading experts from government and industry to explore the critical aspects of Zero Trust surrounding civilian agencies, the Defense Industrial Base (DIB), MIPDEP, and the overall progress of Zero Trust initiatives within the DoD. Join hosts Tom Tittermary and Tom Gianelos for a practical look into how agencies can navigate the DoD Zero Trust landscape.
12 Episodes
Reverse
Episode twelve of the podcast, "Two Great Tastes That Taste Great Together," Zscaler & Vectra AI in the DoD, features Robert Marcoux, Federal Principal Technologist at Vectra AI, for a discussion on why traditional perimeter-based security no longer works in a world dominated by remote users, cloud services, and SaaS, and how Zero Trust has become essential. They explore how AI-driven signal analysis cuts through data noise, helping resource strained security teams detect threats faster and more accurately. The conversation also showcases how Vectra AI’s integration with Zscaler accelerates identity-centric detection and response, reducing MTTR by linking anomalous behavior directly to specific users and increasing visibility into attacks. Finally, the discussion emphasizes practical Zero Trust enforcement through a human in the loop model, combining AI-powered context with analyst oversight to maintain resilience across federal, defense, and critical infrastructure environments.
Episode ten of the podcast, Identity as the Core of Zero Trust, features Dan Miller from Ping Identity, emphasizing that verifying digital identity and assessing user attributes in real time is critical before granting access to any DoD resource. He discusses the importance of using detailed attributes like location, device, and role instead of relying on simple logins to make smarter, real-time access decisions, which is crucial for secure operations in classified and remote environments. Since many DoD units work in disconnected settings, Ping Identity provides local identity solutions that keep missions running and sync with the cloud when reconnected. This episode explores how, in joint missions, enforcing secure data sharing through identity-driven access and tagging paves the way for granular Zero Trust.
Episode nine of the podcast, These Guys Literally Wrote the Book, features Rob Freter and Joe Brinker from True Zero Technologies, delving into the evolving implementation of Zero Trust principles across the Department of Defense, the Defense Industrial Base, and the broader federal government. They discuss the importance of starting with a clear problem statement and solution, emphasizing the cultural and practical need for a structured approach to security, including policy enforcement points (PEPs). Drawing analogies to cinematic sequels like The Godfather Part II, the episode explores how Zero Trust architectures have evolved to be even better with their second iterations, offering cleaner lines and easier readability.
In this episode of Zero Trusts Given, hosts Tom Tittermary and Tom Gianelos are joined by Jared Shepard, CEO of Hypori, to discuss redefining device security and enabling Zero Trust in edge environments. Jared introduces Hypori’s virtual mobile operating system, which eliminates data at rest and transit on edge devices by streaming encrypted pixels securely, allowing users to work from compromised or personal devices without risk to enterprise systems. This approach enables agility in BYOD, tactical missions, and mission partner environments, simplifying access while maintaining strong security posture. Jared also discusses the importance of a defense-in-depth approach, avoiding reliance on single vendors, and improving downstream supply chain security to protect critical infrastructures. The episode concludes with a heartfelt discussion about Jared’s nonprofit, Warrior’s Ethos, which supports veterans transitioning from military service by providing mentorship, resources, and job support. He encourages listeners to volunteer, hire veterans, and help ease their transition into civilian opportunities.
This episode is perfect for tech enthusiasts, cybersecurity professionals, and anyone interested in understanding how Zero Trust is transforming the defense landscape. Tune in to gain valuable insights from leading experts on the forefront of innovation and cybersecurity policy in the DoD!
In this episode of Zero Trust Given, hosts Tom Tittermary and Tom Gianelos chat with Jean-Paul (JP) Bergeaux, CTO of GuidePoint Federal, about implementing Zero Trust in government and DoD environments. They explore key challenges, such as tackling the data pillar, breaking down silos between teams, and automating risk-based decision-making. JP emphasizes the importance of starting small with achievable wins, leveraging existing tools, and taking an iterative approach. He shares how his team helped a DoD agency make significant progress without new tech, showing that Zero Trust is more about collaboration, strategy, and mindset than an overnight overhaul. Zero Trust is a journey of gradual improvement that integrates security into everything while supporting mission effectiveness.
This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders, and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
This episode, featuring hosts Tom Tittermary and Tom Gianelos with special Zscaler guest Conrad Maiorino, explores how Zero Trust eliminates network access points by making applications unreachable, as opposed to traditional security. They discuss Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA), which are used for secure, mutually authenticated user-to-application tunnels, disrupting adversary tactics.
The discussion highlights Zscaler's solution for "Denied, Deprecated, Intermittent or Low Bandwidth" (DDIL/CDOL) scenarios, ensuring secure access even without constant cloud connectivity. The speakers also cover integrating Zscaler with identity providers for policy building based on user attributes and why this Zero Trust security is valuable for the DoD and other critical sectors like hospitals and manufacturing.
This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
It can be daunting to think of the amount of data held by the Federal Government and specifically the DOD. Considering that a full zero trust implementation would mean tagging every piece, regardless of if it is a file, or in a database, we wonder how we could ever get there. Throw into the mix that every day more data is being generated than there is capacity for humans to tag that data effectively. What is there to do? How can we clear the backlog and create new methodologies to tag data effectively in line? Listen this week for some ideas and directions on the matter.
During this episode, David Pearson from ServiceNow joins hosts Tom Tittermary and Tom Gianelos to discuss the process of analyzing and simplifying large amounts of data, and how to make decisions based on the data collected. They also touch on the different Zero Trust Pillars.
This episode is perfect for anyone interested in better understanding data management and the complexities of implementing Zero Trust in large organizations. Tune in today to discover actionable insights on leveraging data for Zero Trust and fortifying your organization's security!
This episode of Zero Trust Given features Skip Farmer from Primer, alongside hosts Tom Tittermary and Tom Gianelos, and examines the role of AI in the Zero Trust security model. From determining access and trust levels for AI entities to the phenomenon of AI “hallucinations” that produce inaccurate information, this episode dives deep into the possibilities and challenges presented by Artificial Intelligence.
This episode is perfect for cybersecurity professionals, tech enthusiasts, and anyone interested in the intersection of artificial intelligence and data security, especially with Zero Trust. Tune in today!
This episode features actionable insights on navigating culture change, discussing the importance of data protection and identity management. Guest speakers James Carnall and Quent Strandburg join hosts Tom Tittermary and Tom Gianelos to discuss the need for integration of cloud solutions and AI to enhance security in a multi-vendor environment. They focus on faster, smarter approaches to cybersecurity workflows through collaboration.
In this insightful episode, join Tom Tittermary, Rich Johnson, and Ryan McArthur as they dive into the critical role Zero Trust plays within the Department of Defense (DoD). The panel explores how Zero Trust principles are reshaping cybersecurity strategies, improving data protection, and strengthening national security in an era of evolving threats.
The conversation addresses key challenges in implementing Zero Trust within the DoD, including cultural shifts, technological barriers, and the complexities of securing legacy systems. The panel also discusses the evolution of Zero Trust policies, frameworks, and tactics over the years, shedding light on lessons learned and what the future holds for its adoption.




