Cloud Security , Security Operations

Securing Federal Government Contractors

How Federal Departments Can Ensure That Contractor Application Access Is Protected
Lorraine Bellon, senior solutions marketing manager, Cloudflare

Federal government departments issue documents, store sensitive PII and disperse vast payments across multiple siloed environments that have inconsistent access requirements, which often make them insecure and a prime target for fraudsters and thieves. How can these departments secure access?

In this video interview with Information Security Media Group, Lorraine Bellon of Cloudflare explores the challenges around integrating diverse applications used by third-party contractors and the unique complexities they bring to federal entities, which are more used to deploying uniform approaches.

Bellon explains:

  • Why traditional IAM solutions are not sufficient in today's environments;
  • Why just relying on VPN access isn’t a viable option;
  • How a zero trust approach can contribute to overcoming these issues.

At Cloudflare, Bellon focuses on enabling networking and security solutions for larger enterprises in sectors including banking and financial services, government, e-commerce and gaming. She also supports privacy and compliance initiatives in multiple geographies. Bellon has worked extensively in cybersecurity, primarily at Cisco, covering cloud security, data privacy and emerging technologies. She is an author, presenter, trainer, volunteer and mentor for young people interested in the tech industry, especially those from marginalized or nontraditional backgrounds.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.