Digital Identity , Governance & Risk Management , Government

Zero Trust Unleashed: Keeping Government Secrets Safer Than the Crown Jewels

Sponsored by Bytes Software Services; in partnership with CyberArk

Government agencies, driven by regulatory requirements and a crucial need to enhance security, are embracing zero-trust architectures. Unlike their commercial counterparts, these agencies must balance security with public service obligations, ensuring access for legitimate users. Our expert panel, drawing from hands-on experience with government agencies, will explore practical insights on leveraging identity for a smooth transition to Zero Trust.

Download now to learn more about:

  • Dedicated Zero Trust practice which follows a holistic strategy helping government organisations address people, process, and technology
  • Market knowledge on meaningful technology integrations
  • Dedicated Identity team with vast experience in aiding government organisations implement Identity Security programmes.

About the Author

Tyler Cohen Wood

Tyler Cohen Wood

Co-Founder of Dark Cryptonite

Tyler Cohen Wood is a globally recognized cybersecurity expert, influencer, and keynote speaker with 20+ years of experience including 13 serving the US Department of Defense. As a former Deputy Division Chief and Senior Intelligence Officer for the US Defense Intelligence Agency, she helped the White House and DoD thwart many threats to US cybersecurity. As a keynote speaker, national security expert, and overall cyber authority, she is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools and knowledge they need to defend themselves in the digital world.

Tyler is co-founder of Dark Cryptonite, a cybersecurity special communications solution. She’s been recognized by Engati as a “2022 Top 50 Global Cybersecurity Influencer” and included in Onalytica’s “2022 Top Cybersecurity Industry Key Opinion Leaders”, “Who’s Who in Cybersecurity” and “2021 Top 10 Cybersecurity Keynote Speakers”, Cybercrime Magazine’s “Top 30 Cybersecurity Experts to Follow” and was a finalist for 2021 Cybersecurity Woman of the Year. Tyler’s expertise has made her a highly sought-after guest and writer for both national and local television, radio, print and online media.

David Higgins

David Higgins

EMEA Technical Director, Cyberark

Since joining CyberArk in 2010, Higgins has worked to help the world’s leading - and most complex - organizations secure and protect their privileged access. Today, he advises clients on threats associated with privileged escalation, lateral movement and credential theft and discusses best practices and driving innovation around privileged management processes.

Robert Pritchard

Robert Pritchard

Director of Cyber Capacity Unit

Robert Pritchard is a leading authority on cybersecurity, having made his success as the founder of The Cyber Security Expert and working with top tier organisations such as the UK Ministry of Defence and the UK Government. Currently working as the Chief Information Security Officer for Cazoo, Robert works with organisations across the country to create innovative cybersecurity solutions that allow businesses to be wise and ready for cyber threats. Now also booked as a keynote speaker, Robert is the perfect choice when looking for an authority to speak on cybersecurity.

Over the past two decades, Robert has worked within the field of cybersecurity, ensuring that the top UK businesses are armed against cyber threats. He first began his career in tech as a Security Consultant for UBS, a role in which he undertook risk assessments and architecture reviews of the business. He later went on to work in Cybersecurity at the UK Ministry of Defence, spending three years as part of the team responsible for cyber incident response and reporting to Government officials. His work with the Ministry of Defence also saw him play an instrumental part in the planning of the London 2012 Olympic Games, ensuring they were cyber ready.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.