Listen "Identity as the Core of Zero Trust"
Episode Synopsis
Episode ten of the podcast, Identity as the Core of Zero Trust, features Dan Miller from Ping Identity, emphasizing that verifying digital identity and assessing user attributes in real time is critical before granting access to any DoD resource. He discusses the importance of using detailed attributes like location, device, and role instead of relying on simple logins to make smarter, real-time access decisions, which is crucial for secure operations in classified and remote environments. Since many DoD units work in disconnected settings, Ping Identity provides local identity solutions that keep missions running and sync with the cloud when reconnected. This episode explores how, in joint missions, enforcing secure data sharing through identity-driven access and tagging paves the way for granular Zero Trust.
More episodes of the podcast Zero Trusts Given
These Guys Literally Wrote the Book
15/09/2025
Thinking Tactically
14/07/2025
Strategies with How to Eat an Elephant
24/06/2025
The Conrad
10/06/2025
Drowning in Data
28/05/2025
Needle in the Haystack
19/05/2025
Do Androids Dream of Electric Data?
12/05/2025
Zero Faith
14/04/2025
In the Beginning
24/03/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.