Skip to content

Cyber Domain Emphasis: Zero Trust Strategy and Lasting Security

"The debute of Episode 72, a special installation titled Project Cyber under the Irregular Warfare Podcast, delves into significant issues shaping the contemporary landscape of irregular warfare. Guided by knowledgeable experts, this undertaking aims to stimulate cross-disciplinary discussions,...

Securing the Digital Frontier: Zero Trust Approach and Enduring Cyber Presence
Securing the Digital Frontier: Zero Trust Approach and Enduring Cyber Presence

Cyber Domain Emphasis: Zero Trust Strategy and Lasting Security

In the latest episode of the Irregular Warfare Podcast, titled "Irregular Warfare Initiative Project Cyber," hosts Laura Jones and Maggie Smith delve into the concepts of zero trust and persistence theory within the cyber domain.

Guest speakers on the podcast include Dr. Richard J. Harknett, codirector of the Ohio Cyber Range Institute and coauthor of "Cyber Persistence Theory: Redefining National Security in Cyberspace," and Mr. David McKeown, the acting DoD principal deputy chief information officer and in the dual role of deputy DoD chief information officer for cybersecurity and DoD senior information security officer.

During the discussion, Dr. Harknett and other guests define these two concepts and highlight how they complement each other in practice. Zero trust, a security model that assumes no user or system is automatically trusted, requires continuous verification of identities and devices before granting access to resources. Persistence theory, on the other hand, focuses on detecting and countering persistent threats, such as advanced persistent threats (APTs), which maintain long-term access to networks through stealthy, ongoing exploitation.

Together, these concepts work in harmony as zero trust limits attack surfaces and access vectors by enforcing strict verification and least-privilege access, reducing opportunities for persistent adversaries to maintain access undetected. Persistence theory guides defenders to anticipate and identify long-term attacker behavior, making continuous monitoring and adaptive defenses necessary within zero trust frameworks.

The Irregular Warfare Podcast is a production of the Irregular Warfare Initiative (IWI), a team of volunteers dedicated to bridging the gap between scholars and practitioners in the field of irregular warfare. The podcast aims to cultivate interdisciplinary dialogue, showcase unique insights, and provide a platform for collaboration.

For those interested in staying updated on IWI's activities, subscribing to the IWI monthly newsletter provides access to written content, upcoming community events, and other resources. The podcast can be followed and engaged with on Facebook, Twitter, Instagram, YouTube, or LinkedIn.

The first installment of the special Irregular Warfare Initiative Project Cyber is just the beginning of a series of discussions exploring the intersection of irregular warfare and cybersecurity. As the digital landscape continues to evolve, understanding and implementing concepts like zero trust and persistence theory will be crucial in maintaining a secure and resilient cyber environment.

  1. The Irregular Warfare Podcast, which explores the intersection of irregular warfare and cybersecurity, recently discussed the concepts of zero trust and persistence theory within the cyber domain.
  2. Zero trust, a security model requiring continuous verification of identities and devices, works in harmony with persistence theory to limit attack surfaces and access vectors, and detect and counter persistent threats.
  3. Persistence theory, which focuses on identifying long-term attacker behavior, guides defenders to implement continuous monitoring and adaptive defenses within zero trust frameworks.
  4. As the digital landscape continues to evolve, understanding and implementing these concepts, such as zero trust and persistence theory, will be crucial in maintaining a secure and resilient cyber environment.

Read also:

    Latest