
This document certifies that
Richard Okaka
is awarded a Certificate of Completion for
Navigating the Complex Landscape of Modern Threats, Zero Trust Strategies for Enhanced Security
January 31, 2024
CERTIFICATE OF COMPLETION
THE CENTER FOR EXCELLENCE IN PUBLIC LEADERSHIP
COLLEGE OF PROFESSIONAL STUDIES AT THE GEORGE WASHINGTON UNIVERSITY
805 21st Street, NW, Washington, DC 20052
Liesl Riddle, PhD
Dean, College of Professional Studies
The George Washington University

Earning 1 CPE in the following category - Business Management and Organization
National Registry of CPE Sponsors Number 115749
Instructional Delivery Method: Group Internet-Based Training
Training presented by GWU CPS/CEPL in collaboration with FedInsider.com
(202) 237-0300 | certs@fedinsidernews.com
In accordance with the standards of the National Registry of CPE Sponsors, CPE Credits have been granted on a 50-minute hour.
Navigating the Complex Landscape of Modern Threats, Zero Trust Strategies for Enhanced Security
Richard Okaka
The cat-and-mouse game between threat actors and cybersecurity professionals continued unabated in 2023, with new threats designed to avoid detection. Many of these threats are new takes on old ones, such as "leveling up" invoice fraud. And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment by threatening to post the info online or to simply erase it. As attack vectors evolve incessantly, the need to understand these threats intensifies.
The Cybersecurity and Information Security Agency (CISA) released a report in July 2023 that examined a group of threat actors and how they were so successful. “Our attention was drawn immediately towards the identity and access management ecosystem; the way threat actors abused telecommunications providers; the relationships between organizations and their outsourcing companies; and how the law enforcement ecosystem plays a vital role in deterrence,” the report noted.
Learning Objectives:
-Review how old cyber threat techniques are being adapted to address cybersecurity measures taken by agencies and organizations, and the new attack vectors that are emerging.
-Identify ways that having a zero-trust architecture can address these emerging threats.
-Outline steps agencies can take to prioritize risks from new threats while maintaining vigilance against established attack vectors.
Issued on
January 31, 2024
Expires on
Does not expire