PODCAST: History of Zero Trust and Government (Part 2)

In the following Makpar Cybersecurity Forum podcast interview, Larry Hunt, Director of Business Development at Makpar, discusses the history of Zero Trust and government. This is part two of a two-part podcast series, where Larry highlights changes in information security that bring us to Zero Trust today, as well as advancements in Zero Trust in 2022.

Listen to the part one of this podcast series, where Larry provides an overview of the key milestones in the overall history of Zero Trust here.

The term “Zero Trust” was first coined in a doctoral thesis back in 1994. Later the term was used by Forrester Research around the concept of “never trust, always verify.” In this podcast interview, Mr. Hunt provides a high-level overview of the history of Zero Trust, along with a detailed timeline of the evolution of Zero Trust.

Mr. Hunt has the distinction of being one of the founders of the EDP Auditors Foundation in the 70’s when as a Computer Auditor, he began his career in what is known today as Cybersecurity.

In 1985, his achievements and certifications were recognized by the Association of the Institute for Certification of Computer Professionals,. He also received the designation as Distinguished Faculty (CIA) from the Institute of Internal Auditors for his pioneering and committed efforts in education and certification of Internal Auditors in computer auditing best practices and techniques.

Mr. Hunt went on to obtain many more certifications and awards in several computer related fields, including being a sworn member (LEO) and advisor for the Southern Virginia Internet Crimes Against Children Task Force under the Department of Justice for nearly 10 years (for which he received the Senatorial Medal of Freedom) and working with the National Institute of Standards and Technology and the National Cybersecurity Center of Excellence as a voluntary contributing associate.

Makpar’s highly skilled and certified cybersecurity experts understand the technology and methodologies required to preserve the Confidentiality, Integrity, and Availability of information in all computing environments. Please click here to learn more.

Previous
Previous

The Fed Mission Success Round Up: An Expanded DoD Cyber Workforce; NIST Seeks Diversity in AI; and Tech Diplomacy at State Department

Next
Next

VIDEO PODCAST: Get Certified – Amazon Web Services (AWS) Cloud Practitioner Certification Tips