Download Publication
Who it's for:
- Cybersecurity architects and engineers
- OT and ICS operators and engineers
- IT personnel
- Executive stakeholders
Zero Trust Guidance for Critical Infrastructure
Release Date: 10/28/2024
- Unique security risks and threat vectors for Critical Infrastructure
- How Operational Technology converges with digital transformation
- Differences in objectives and architecture of Operational Technology vs traditional Information Technology
- Review of the five-step implementation process for Zero Trust
- How to apply the five-step process to Industrial Controls Systems and Operational Technology security
- How vendors are building Zero Trust capabilities into new technology
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Acknowledgements
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA
Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).
I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.
Linke...
Jennifer Minella
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...
Dr. Ron Martin
Professor of Practice at Capitol Technology University
Dr. Martin is a Professor of Practice at Capitol Technology University. His work at Capitol Technology University is in the following functional areas Critical Infrastructure, Industrial Control System Security, Identity, Credential, and Access Management. Ron has relationships with a diverse mix of businesses. He serves as a board of directors for many profit and non-profit organizations. Ron retired from the United States (U. S.) Army in ...
Interested in helping develop research with CSA?
Related Certificates & Training
Learn more