Loading Events

2023 ATARC Zero Trust Summit

March 23, 2023, 7:30 AM - 3:00 PM ET | Marriott Marquis, Washington DC

6.0 CPE Credits Available for this Event***

Register Partnership Opportunities
}

7:30 AM

Registration   |    Breakfast

}

8:30 AM

Welcome and Opening Remarks

Tom Suder

Tom Suder

Founder / CEO, ATARC

}

8:30 AM

Visionary Keynote Briefing

Gerry Caron III

Gerry Caron III

Chief Information Officer, International Trade Administration, U.S. Department of Commerce

}

8:45 AM

Visionary Panel: Supporting Your Agencies’ Zero Trust Goals

Implementing and staying up to date with your agency’s zero trust model can be challenging for a few reasons. Top three challenges that Federal agencies are facing includes: 

  • Complexity of implementing a zero trust model across a network with many diverse and large departments, agencies, and systems. 
  • Meeting compliance requirements in place to access data and systems within an agency. Especially as ZT may require significant changes to your existing policies and procedures. 
  • The level of collaboration and coordinator across different departments and agencies, especially with each department’s own prioritization of tasks. 

Each agency’s journey and solution will be unique. With such a vast array of challenges and options, how can agencies get started? This session will discuss the specific challenges Federal agencies have run into and how they’ve been able to support their zero trust goals as we start off 2023!  

Dr. Mark Stanley

Dr. Mark Stanley

Enterprise Cybersecurity Architect, National Aeronautics and Space Administration

Jodi Kouts

Jodi Kouts

Senior Advisor for Policy, IM-1, Office of the Chief Information Officer, U.S. Department of Energy

Conrad Bovell

Conrad Bovell

Branch Chief, Cybersecurity Advisory and Strategy, Office of Information Security, U.S. Department of Health and Human Services

Alyssa Feola

Alyssa Feola

Cybersecurity Advisor Technology Transformation Services, Federal Acquisition Service, U.S. General Services Administration

Jean-Paul Bergeaux

Jean-Paul Bergeaux

Federal Chief Technology Officer, GuidePoint Security

Moderator: Joe Franco

Moderator: Joe Franco

Director of Programs, MeriTalk

}

10:00 AM

Emerging Technology Talk

Zeroing In on Zero Trust – Why Federal Agencies Must Take a Threat informed Defense Approach 

To keep pace with threat actors, Federal Agencies must codify and automate MITRE ATT&CK and D3FEND knowledge into security operations workflows and playbooks to understand and identify where gaps exist in cyber defense capabilities. This is essential in formalizing the right Zero Trust strategies to protect critical mission functions and capabilities. These strategies must be informed by near-time signal analytics, actionable threat intel and high-fidelity user behavior analytics to zero-in on threat actor activity. Implementing the right strategies to mature Zero Trust capabilities and improve cyber defense can be the difference in avoiding a major data breach.


In this session you will hear from OpenText Public Sector CTO, Kevin E. Greene as he provides valuable content and things to consider in your zero trust journey.

Kevin Greene

Kevin Greene

Public Sector Chief Technology Officer, OpenText Cybersecurity

}

10:15 AM

Visionary Panel: All Hands on Deck: Implementing Zero Trust Architecture

The paradigm shift over the past decade and a half has had a crucial impact on agencies’ current environment of the pandemic response. Even the definition of “perimeter” itself has transformed over time. Current mandated practices as well as fading out older models of Zero Trust have been challenging times but are calling for new practices, and Zero Trust framework in the future of cybersecurity. Finding the pathway to implement Zero Trust Architecture is a challenge within itself and figuring out where to begin will be an all hands on deck situation. 

Listen in as topic experts explain how they began their Zero Trust Architecture implementation process, in addition to the challenges that may have floated in their path. 

Tony Plater

Tony Plater

Chief Information Security Officer (Acting), Office of the Chief Information Officer, Under Secretary of the Navy, U.S. Department of the Navy

Dr. Sean Cortopassi

Dr. Sean Cortopassi

Division Director, Program Systems Management Office, U.S. Department of Housing and Urban Development

Jane Zentmyer

Jane Zentmyer

Director for the Architecture and Transformation Division, Office of Inspector General, U.S. Department of Health & Human Services

Michele Thomas

Michele Thomas

Chief Information Security Officer, Office of the Under Secretary, Science and Technology Directorate, U.S. Department of Homeland Security

Kelvin Brewer

Kelvin Brewer

Director, Public Sector Sales Engineering, ForgeRock

Moderator: Derek Johnson

Moderator: Derek Johnson

Senior Reporter, SC Magazine

}

11:00 AM

Emerging Technology Talk 

ZTNA 2.0 at Palo Alto Networks: How We Secure Our Hybrid Workforce

In this session we’ll discuss Zero Trust and ZTNA, how they relate to each other, and how Palo Alto Networks uses ZTNA 2.0. As a security company and a first customer of our own products, we leverage a Zero Trust architecture as well as ZTNA 2.0 principles not only to manage our hybrid workforce, but also to protect our “crown jewels”—our intellectual property, customer data and employee data.

Wayne LeRiche

Wayne LeRiche

Field Chief Technology Officer - Federal Civilian, Palo Alto Networks

}

11:00 AM

Emerging Technology Talk 

Securing NPE’s with a Control Plane for Machine Identity Management

As agencies continue to plan, execute, and adapt their zero trust strategies, securing the non-person entities (NPEs) across the mix of classic and modern architectures demands its own control plane. In this session, learn how a Machine Identity Management Control Plane is helping agencies gain visibility, analytics, governance, automation and orchestration of their machine identities from digital certificates to software supply chains. 

Nick Curcuru

Nick Curcuru

Head of Solutions Marketing, Venafi

}

11:15 AM

Visionary Panel: The Clock is Ticking: Zero Trust and Executive Requirements

It has been over a year since the Biden Administration released the federal government’s zero trust strategy. Federal agencies have wasted little time getting to work to meet the end of fiscal year 2024 deadline but there’s still lots of work left to do.

Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life.  The Federal Government must bring to bear the full scope of its authorities and resources to protect and secure its computer systems, whether they are cloud-based, on-premises, or hybrid. But, where did Federal agencies start their journey? 

Listen in as top Federal leaders discuss the steps they’ve taken to meet Zero Trust requirements and where they’re heading in 2023. 

Gerry Caron III

Gerry Caron III

Chief Information Officer, International Trade Administration, U.S. Department of Commerce

Daniel Dister

Daniel Dister

Deputy Director, Office of the Enterprise Chief Information Security Officer, Bureau of Information Resource Management, U.S. Department of State

Eric Sanders

Eric Sanders

Chief Information Security Officer, Office of Intelligence and Analysis, U.S. Department of Homeland Security

Sean Connelly

Sean Connelly

Trusted Internet Connections (TIC) Program Manager and Senior Cybersecurity Architect, Cybersecurity Division, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Brian Dennis

Brian Dennis

Principal Technologist, Akamai

Moderator: Nihal Krishan

Moderator: Nihal Krishan

Tech Reporter, CyberScoop, FedScoop

}

11:45 AM

Lunch   |   Emerging Technology Showcase

}

1:15 PM

Visionary Keynote Briefing

Col. Gary Kipe

Col. Gary Kipe

Deputy Director, Zero Trust Portfolio Management Office for the Department of Defense Chief Information Office, Cyber Security Directorate, U.S. Department of Defense

}

1:30 PM

Visionary Panel: Identity Access and Zero Trust – How Federal Agencies are Handling Remote Security

In the age of the cloud, cybersecurity can no longer be defined by the perimeter of a network. This has become more apparent than ever as millions of Federal workers were sent home in March 2020 when the pandemic enforced social distancing. Many Federal employees still work remotely or hybrid, today.

A zero-trust security architecture is one where users on a network are not trusted by default and instead are required to provide credentials and earn authorization, typically with continuous validation, anytime they move around a network. With remote and hybrid work,  Identity and Access Management (IAM) becomes even more crucial. It is a foundational element of Zero Trust, following an integrated digital identity framework comprising solid IAM policies, permissions, and technologies becomes critical to the success of our Federal Zero Trust architecture.

Topic experts will discuss the concepts of “never trust, always verify” when it comes to Identity Management and controlling access. They’ll address the importance of strengthening your ZTA, with remote workers in mind. 

Melinda Rogers

Melinda Rogers

Deputy Assistant Attorney General and Chief Information Officer, Information Resources Management, Justice Management Division, U.S. Department of Justice

Wayne Rodgers

Wayne Rodgers

Zero Trust Lead, Office of the Chief Information Officer, U.S. Department of Education

Ross Foard

Ross Foard

ICAM Subject Matter Expert, Continuous Diagnostics and Mitigation Program, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Param Soni

Param Soni

Chief Information Officer, Office of the Chief Information Officer, Bureau of Economic Analysis, U.S. Department of Commerce

André Mendes

André Mendes

Chief Information Officer, U.S. Department of Commerce

Sean Frazier

Sean Frazier

Senior Director & Federal Chief Security Officer, Okta

Moderator: Tom Suder

Moderator: Tom Suder

Founder / CEO, ATARC

}

2:05 PM

Emerging Technology Talk

Simplifying the Complexity of Zero Trust

Join us while we explore simplifying zero trust methodologies through focusing on data security and achieving the freedom of control. We will discuss real world examples of daily computing challenges that are faced globally and often overlooked, while highlighting innovative solutions to these problems.

 

Jim Coyle

Jim Coyle

Federal Security Strategist, Lookout

}

2:12 PM

Emerging Technology Talk

The 4th Pillar of Zero Trust: Dedicated Application Security Testing at Scale

A critical component to moving the Federal Government to a Zero Trust framework involves agencies routinely testing applications and workloads. Memorandum 22-09 requires conducting dedicated application security testing, working with third parties for security testing evaluation, and maintaining an effective public VDP. In this session, we’ll discuss ways that agencies are using strategic security testing to surpass the requirements in M-22-09 while identifying the root causes of vulnerability flares and patterns observed in their APIs, cloud, host & web environments.

 

Scott Ormiston

Scott Ormiston

Federal Solutions Architect, Synack

}

2:20 PM

Visionary Panel: The Future of Zero Trust Within the Federal Government

As the workforce has had to transition to teleworking, the importance of Zero Trust Security has skyrocketed. Zero Trust has become an enabler of the remote workforce along with traditional network security models. Zero Trust is better equipped to perform, and therefore better suited for aiding organizations maintaining a hybrid working model. 

One frequently overlooked obstacle to switching to a zero-trust cybersecurity model is the need for ongoing administration. Zero-trust models rely on a vast network of strictly defined permissions, but companies are always evolving.

Listen in as Federal topic experts explore the current status of Zero Trust, ways to strengthen Zero Trust, as well as how they are moving to implement zero-trust architecture and the challenges that agencies can face while keeping pace with the ongoing federal requirements.. Where do these topic experts think Zero Trust can improve on? What best strategies will help improve on these issues?

 

Jonathan White

Jonathan White

Zero Trust Lead, Cloud & Data Branch Chief, U.S. Coast Guard

Dr. Amy Hamilton

Dr. Amy Hamilton

Senior Cybersecurity Advisor Policy and Programs, Office of Cybersecurity and CISO, Office of the Chief Information Officer, U.S. Department of Energy

Don Coulter

Don Coulter

Senior Science Advisor, Cybersecurity, Office of Science and Engineering, Science and Technology Directorate, U.S. Department of Homeland Security

Peter Romness

Peter Romness

Cybersecurity Principal, CISO Advisors, Cisco

Moderator: Justin Doubleday

Moderator: Justin Doubleday

Reporter, Federal News Network, WTOP-FM

Watch On Demand

Media Partners

By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy. By registering for this event you agree to receive event reminders via email, text, and/or phone call communications.

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 
*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Live. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.