Cyber Domain Emphasis: Zero Trust Strategy and Lasting Security
In the latest episode of the Irregular Warfare Podcast, titled "Irregular Warfare Initiative Project Cyber," hosts Laura Jones and Maggie Smith delve into the concepts of zero trust and persistence theory within the cyber domain.
Guest speakers on the podcast include Dr. Richard J. Harknett, codirector of the Ohio Cyber Range Institute and coauthor of "Cyber Persistence Theory: Redefining National Security in Cyberspace," and Mr. David McKeown, the acting DoD principal deputy chief information officer and in the dual role of deputy DoD chief information officer for cybersecurity and DoD senior information security officer.
During the discussion, Dr. Harknett and other guests define these two concepts and highlight how they complement each other in practice. Zero trust, a security model that assumes no user or system is automatically trusted, requires continuous verification of identities and devices before granting access to resources. Persistence theory, on the other hand, focuses on detecting and countering persistent threats, such as advanced persistent threats (APTs), which maintain long-term access to networks through stealthy, ongoing exploitation.
Together, these concepts work in harmony as zero trust limits attack surfaces and access vectors by enforcing strict verification and least-privilege access, reducing opportunities for persistent adversaries to maintain access undetected. Persistence theory guides defenders to anticipate and identify long-term attacker behavior, making continuous monitoring and adaptive defenses necessary within zero trust frameworks.
The Irregular Warfare Podcast is a production of the Irregular Warfare Initiative (IWI), a team of volunteers dedicated to bridging the gap between scholars and practitioners in the field of irregular warfare. The podcast aims to cultivate interdisciplinary dialogue, showcase unique insights, and provide a platform for collaboration.
For those interested in staying updated on IWI's activities, subscribing to the IWI monthly newsletter provides access to written content, upcoming community events, and other resources. The podcast can be followed and engaged with on Facebook, Twitter, Instagram, YouTube, or LinkedIn.
The first installment of the special Irregular Warfare Initiative Project Cyber is just the beginning of a series of discussions exploring the intersection of irregular warfare and cybersecurity. As the digital landscape continues to evolve, understanding and implementing concepts like zero trust and persistence theory will be crucial in maintaining a secure and resilient cyber environment.
Read also:
- Navigating Strategic Direction in the Age of Artificial Intelligence Automation
- A separate cable linked to an RTX 50-Series GPU melting could potentially not be attributable to Nvidia.
- List of 2025's Billionaire Video Game Moguls Ranked by Fortune
- Notable Data Visualization Examples, Artificial Intelligence Suggestions, and Available Resources