Extending Zero Trust to the Software Development Lifecycle: An Ecosystem Approach

Event Overview

Join WWT, Red Hat, Zscaler, and CrowdStrike to learn how to apply Zero Trust Architecture (ZTA) principles for software development environments, discussing challenges, misconceptions, and strategies for implementation.

Paul Cunningham

World Wide Technology

Chief Technical Advisor

Paul Cunningham is a Chief Technical Advisor for Information Security at World Wide Technology (WWT) focused on federal government organizations. P...
Sam Richman

Red Hat

Associate Principal Solution Architect

Sam Richman is an Associate Principal Solution Architect at Red Hat focused on aerospace and defense with 25 years of experience supporting US Civi...
Bob Smith

Zscaler

Director of Federal Systems Engineering

Bob Smith is the Director of Federal Systems Engineering at Zscaler. His team covers Civilian Agencies, DOD, Intelligence Community customers, and ...
Evan Stoner

CrowdStrike

Senior Solution Architect

Evan Stoner is a Senior Solution Architect at CrowdStrike focused on integrating its leading security platform with Red Hat’s enterprise open sourc...

What to expect

Here are the key topics discussed in the meeting:
  • ZTA Deployment and Software Development: Discussion on reducing risk in software development by deploying zero trust capabilities in a multi-vendor environment. 0:04
  • Zero Trust Architecture: Insights into the evolution of zero trust, its implementation challenges, and the interconnectedness of zero trust pillars. 2:27
  • Software Development Life Cycle (SDLC): How zero trust can be integrated into SDLC, leveraging existing tools and investments. 5:28
  • Vendor Ecosystem Architecture: The role of vendor partnerships in achieving zero trust architecture, with a focus on interoperability and leveraging existing cybersecurity investments. 3:20
  • Reference Architecture for ZTA: Discussion on a hardware infrastructure and hardware agnostic multi-hybrid cloud architecture that enforces zero trust policies across different pillars. 11:30
  • Role of Red Hat Openshift Container Platform: How it supports the reference architecture by providing a platform for building, modernizing, and deploying applications securely. 12:57
  • Zscaler's Contribution: Zscaler's role in augmenting ZTA implementation and software development through secure transport layers and policy enforcement. 15:19
  • CrowdStrike's Role: CrowdStrike's contribution to ZTA adoption in software development, focusing on device trustworthiness and policy enforcement. 22:11
  • Integration Challenges and Solutions: The importance of a trusted integrator and multi-vendor approach in simplifying ZTA implementation and integration. 25:11

Goals and Objectives

The video discusses the implementation of Zero Trust Architecture (ZTA) in software development, emphasizing risk reduction and the role of industry partnerships in overcoming challenges. It covers the 2022 OMB directive on Zero Trust, progress in its adoption, and offers insights from industry leaders on common misconceptions and key focus areas for effective integration into the software development lifecycle.

Who should attend?

Developers, Directors/Managers responsible for application development or cybersecurity, Solution Architects, Security Architects, Security Engineers, Infrastructure Engineers.