Securing Critical Infrastructures with Zero Trust: CCZT Training Overview and Hands-On Demonstration | Anna McKee and Jason Garbis
As organizations work to protect critical infrastructure with Zero Trust architectures, there is a growing need for practitioners who can translate these principles into operational controls in complex environments. The Cloud Security Alliance's (CSA) CCZT program provides vendor-neutral training aligned to NIST and CISA guidance, emphasizing identity, device posture, and contextual signals for continuous authorization. This overview sets the foundation for a hands-on demonstration of how these controls are applied to secure access to sensitive, mission-critical resources.
As federal agencies accelerate adoption of Zero Trust architectures, workforce readiness has become one of the most critical challenges. This session uses an interactive exercise to illustrate how Zero Trust concepts are applied in practice. Attendees will see how identity, device posture, and contextual signals can be used to dynamically authorize access to protected resources, providing a practical view of how Zero Trust principles translate into real-world implementation.
- Tags
-