Implement a Data-first Approach to Zero Trust
Implement a Data-first Approach to Zero Trust

Today every Federal agency is working to implement zero trust. Each will begin in a unique place that is dictated by its current cybersecurity posture, cybersecurity investments, and agency missions.

Still, many questions must be answered as agencies plot their zero-trust journey. Which pillar in the Zero Trust Maturity Model is most urgent? Which data is more vulnerable to attacks? How do you find and classify the most sensitive information?

MeriTalk sat down with Justin Wilkins, director of sales engineering, public sector, Varonis, to understand how agencies can implement a data-first approach to zero trust.


Please provide the information below. All fields are required.

  • By registering for this resource and providing my contact information, I consent that MeriTalk and its partners may contact me regarding with other relevant information, products, and services. Any information I supply is subject to MeriTalk's privacy policy.