Federal experts recently came together to discuss the complexities of building and securing zero trust architecture in government. In a roundtable hosted by ATARC and PingIdentity, panelists explored the intricacies of implementing Identify, Credential, and Access Management (ICAM) frameworks. Discussion explored myriad obstacles agencies face, particularly with legacy systems, and highlighted key considerations for authentication, data sharing, governance, and privacy in a zero trust environment.