Staying One Step Ahead: Justin Hodges at the Naval Information Warfare Center Atlantic

## [Video Title]: Exploring Zero Trust Architecture and Data Protection Practices



In this video, Justin Hodges, the Integrated Product Team Lead at Naval Information Warfare Center – Atlantic, discusses the importance of treating data as a strategic asset and leveraging zero trust architecture to enhance data protection practices. As the work-from-anywhere model becomes the new norm, organizations are exploring the next level of zero trust architectures and ways to secure data as it traverses from device to cloud and between clouds.

🔔 [Subscribe]( for more cybersecurity content and hit the notification bell to never miss an update!

**Table of Contents:**
– [Why Data is a Strategic Asset](#why-data-is-a-strategic-asset)
– [Leveraging Zero Trust Architecture](#leveraging-zero-trust-architecture)
– [Endpoint Security in the BYOD Era](#endpoint-security-in-the-byod-era)
– [Defending Against Advanced Insider Threats](#defending-against-advanced-insider-threats)

### Why Data is a Strategic Asset

Data is a crucial asset for organizations, but it’s important to go beyond just talking about it. Justin Hodges emphasizes the need to identify the most critical data and implement effective protection measures. By focusing on the data that drives decisions, organizations can stay cost-effective while ensuring data security and availability.

![Data Protection](

### Leveraging Zero Trust Architecture

Zero trust architecture is not a solution that can be bought off the shelf; it’s a paradigm shift in network security. Hodges explains the importance of eliminating exceptions and minimizing trust within network architectures, as well as to external partner networks. Tailoring the zero trust methodology to specific architectures and balancing it with mission and availability needs is crucial.

To learn more about zero trust architecture, check out the [Zero Trust Networking Framework by NIST](

### Endpoint Security in the BYOD Era

The COVID-19 pandemic has accelerated the adoption of bring your own device (BYOD) policies for remote work. Hodges discusses the challenges and opportunities presented by BYOD in conjunction with zero trust practices. Analyzing the differences between user-provided devices and government/organizational furnished equipment helps in monitoring and segregating sensitive data on the network.

### Defending Against Advanced Insider Threats

The SolarWinds supply chain attack highlighted the risks associated with compromised trust in certificates or routes between products. Hodges offers advice on protecting data from apparent trusted users and defending against advanced insider threats. While user behavior analytics and policies are helpful, they are not a panacea. Combating insider threats requires a comprehensive approach, including counter-insider threat programs and continuous monitoring.

For more insights on insider threats, refer to the [NIST Guide to Insider Threats](

**🔗 Additional Resources:**
– [Zero Trust Networking Framework by NIST](
– [NIST Guide to Insider Threats](

###[vid_tags]: #cybersecurity #zerotrust #datasecurity #networkarchitecture #BYOD #insiderthreats

*This video is hosted by [CyberScoop](*

Naval Information Warfare Center’s Justin Hodges says cybersecurity exists to make things more secure while allowing the mission to be successful. He shares NIWC Atlantic’s approach on modernizing data storage, retention and collection, in addition to expanding access to trusted users.

Justin Hodges is the Integrated Product Team Lead, Cyber Security Services Provider Naval Information Warfare Center – Atlantic, Naval Information Warfare Center

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Unveiling the ‘Barbenheimer’ Phenomenon: A Thrilling Summer Movie Rivalry

Exciting New School Bag Collection Unveiling in North Zone | Check out the Latest on YT Shorts with @thejk06bvlogger58!