CyberScape: Zero Trust Breakfast
Zero trust is sweeping across government. Following the May 2021 White House Executive Order on Improving the Nation’s Cybersecurity, IT leaders are implementing new structures and systems to build the foundation for zero trust. Government leaders will address topics such as ICAM strategy and software-defined network access structure. Tech-minded leaders from defense and civilian agencies discuss best practices and how this will impact future procurements and their missions.
Speakers / Panelists
Speakers / Panelists
-
Michael Hoffman President GovCIO Media & Research
The White House Executive Order on Improving the Nation’s Cybersecurity highlighted the need for a new federal cybersecurity approach, but zero trust isn’t a one-size-fits-all solution. For many federal agencies, data quality, standards and governance determine their zero trust readiness. Learn how federal agencies can prepare for a zero trust architecture, starting with data.
Speakers / Panelists
-
Jay Gazlay Associate Director for Vulnerability Management, Cybersecurity Division CISA
-
Moderator Kate Macri Deputy Editor GovCIO Media & Research
Speakers / Panelists
-
Sterling Wilson National Alliances Leader, Data Security and Management Rubrik Federal
As federal agencies continue to develop zero trust architectures and frameworks, accurate and efficient user verification is a key piece to nail down. In environments like health care and law enforcement, speed of verification and layers of privacy protection are even more critical. We’ll talk with federal agencies grappling with these challenges in their mission work and how best practices in ICAM can help.
Speakers / Panelists
-
Felipe Fernandez Director, Systems Engineering Fortinet Federal
-
Kenneth Myers Director, Identity Assurance and Trusted Access Division, GSA
-
Sarah Sybert Senior Staff Writer/Researcher GovCIO Media & Research
Speakers / Panelists
Federal agencies adopting cloud solutions and integrating new software applications into their cloud-based IT infrastructure need new cyber strategies to secure the software-defined perimeter. The SBOM has emerged as a new way to identify and track potential vulnerabilities in the software supply chain. Hear from cloud and cyber leaders about how they’re using SBOMs and other techniques to secure software applications in the cloud.
Speakers / Panelists
-
Natalia Martin Acting Director, National Cybersecurity Center of Excellence NIST
-
Phil Stupak Director of Federal Cybersecurity Office of the National Cyber Director
-
Nicole Thompson Digital Services Expert Defense Digital Service
-
Adam Patterson Staff Writer/Researcher GovCIO Media & Research
Speakers / Panelists
-
Michael Epley Chief Architect and Security Strategist Red Hat
Securing cloud user endpoints, such as desktops, laptops and mobile devices, is a major challenge for federal agencies as they move to the cloud and support a distributed workforce. Zero trust principles like ICAM solutions can help, but harmonizing endpoint security goals with mission needs requires flexibility and adaptability. This panel will draw insights on endpoint security in a remote, cloud-based work environment.
Speakers / Panelists
-
Gerald Caron CIO, Office of the Inspector General HHS
-
Drew Malloy Technical Director, Cyber Development Directorate DISA
-
Jesse Peoples Chief Security Architect Leidos
-
Don Watson CISO USPTO
-
Katherine MacPhail Staff Writer/Researcher GovCIO Media & Research
-
Gerald Caron CIO, Office of the Inspector General, HHS
-
Kurt DelBene Assistant Secretary for Information and Technology and CIO, VA
-
Michael Epley Chief Architect and Security Strategist, Public Sector, Red Hat
-
Felipe Fernandez CTO, Fortinet Federal
-
Jay Gazlay Associate Director for Vulnerability Management, Cybersecurity Division, CISA
-
Amy Kluber Editor-in-Chief, GovCIO Media & Research
-
Katherine MacPhail Staff Writer/Researcher, GovCIO Media & Research
-
Kate Macri Deputy Editor, GovCIO Media & Research
-
Drew Malloy Technical Director, Cybersecurity and Analytics Directorate, DISA
-
Natalia Martin Acting Director, National Cybersecurity Center of Excellence, NIST
-
Kenneth Myers Director, Identity Assurance and Trusted Access Division, GSA
-
Adam Patterson Staff Writer/Researcher, GovCIO Media & Research
-
Jesse Peoples Chief Security Architect,, Leidos
-
Phil Stupak Director of Federal Cybersecurity, Office of the National Cyber Director
-
Sarah Sybert Senior Staff Writer/Researcher,, GovCIO Media & Research
-
Nicole Thompson Digital Services Expert, Defense Digital Service
-
Don Watson CISO, USPTO
-
Sterling Wilson National Alliances Leader, Data Security and Management, Rubrik Federal