The Role of Emerging Technology in the Federal Emergency Response

ATARC Virtual Conference: June 11, 2020 from 9 AM-3 PM
Government RegistrationIndustry Participation

Security (Track 5)

}

11:45 AM-12:15 PM

Security (Track 5) Keynote

Royce Allen

Royce Allen

Director, Enterprise Security Architecture, VA

}

12:05 -12:15 PM

Remote Work: Visibility Issues and How Do You Solve Them.

When the mission gets set on its head, with the need for more if not all the workforce is required to work remote, how does the organization solve the increased VPN traffic data, while ensuring the security and network teams obtain adequate information to make educated decisions.

Learn:

  • What happens when the increased traffic is looping through the network
  • Why split tunneling limits security awareness and leaves a giant blind spot
  • How to effectively disseminate data to both security and network operations team in real time to reduce tool overload during this situation

Join this session to get a better understanding of how real-time network visibility plays within the availability and security of the network to make better decisions, helping to prevent network outages and to uncover new threats.

Peter Steyaert

Peter Steyaert

Senior Solutions Architect, DOD/Intel, Gigamon

}

12:05-1:05 PM

Security Panel 1: Compliance and Risk Management

Jon Feibus

Jon Feibus

CISO, NRC

Jack Jones

Jack Jones

Chairman, FAIR Institute

Royce Allen

Royce Allen

Director, Enterprise Security Architecture, VA

John Fanguy

John Fanguy

Public Sector Chief Technology Officer, Micro Focus

Moderator: Jill Aitoro

Moderator: Jill Aitoro

Executive Editor, Defense & Federal Group, Sightline Media Group

}

12:50-1:05 PM

Zero Outage – A  Tactical Strategy for IT Organizations to Deliver Cost-Effective DevSecOps Today

 

The “Zero Outage” approach to delivering and evolving IT is proven to help large IT organizations reduce development and support costs, improve responsiveness to mission needs, and reduce the inherent security risks in development and operations.  Join this session to learn how you can begin today to achieve cloud management with consumable services, build in appropriate security governance as you develop, and achieve real-time monitoring, scalability, etc. as your organizations build, enhance, and maintain your applications.

 

John Fanguy

John Fanguy

Public Sector Chief Technology Officer, Micro Focus

}

1:05-1:35PM

Lunch and Technology Showcase

}

1:35-2:10 PM

Security Afternoon Keynote

Sean Connelly

Sean Connelly

TIC Program Manager, DHS

}

1:55-2:10 PM

Common Threats to Cloud Security 

In this session we’ll discuss some of the most frequent threats seen with cloud infrastructures including S3 Buckets, misconfigurations, and challenges with new cloud infrastructures for administrators.  We’ll also cover some best practices in securing your cloud infrastructure.

Jon Clay

Jon Clay

Global Threat Communications, Trend Micro

}

2:10-3:05 PM

Fireside Chat: Managing the Lifecycles of Identities and Access

Steve Schlarman

Steve Schlarman

Lead Portfolio Strategist, RSA

Jon Feibus

Jon Feibus

CISO, NRC

Moderator: Jason Miller

Moderator: Jason Miller

Executive Editor, Federal News Network

}

2:50-3:05 PM

Managing Digital Risk in Transformative Times

This year has proven the need to accelerate digital transformation and leverage the momentum of automating business operations to deliver on your mission.  With the acceleration of digital initiatives, an integrated approach to digital risk management is an even more critical element of success.

Steve Schlarman

Steve Schlarman

Lead Portfolio Strategist, RSA