
2023 ATARC Zero Trust Summit
March 23, 2023, 7:30 AM - 3:00 PM ET | Marriott Marquis, Washington DC6.0 CPE Credits Available for this Event***
7:30 AM
Registration | Breakfast
8:30 AM
Welcome and Opening Remarks

Tom Suder
Founder / CEO, ATARC
8:30 AM
Visionary Keynote Briefing

Gerry Caron III
Chief Information Officer, International Trade Administration, U.S. Department of Commerce
8:45 AM
Visionary Panel: Supporting Your Agencies’ Zero Trust Goals
Implementing and staying up to date with your agency’s zero trust model can be challenging for a few reasons. Top three challenges that Federal agencies are facing includes:
- Complexity of implementing a zero trust model across a network with many diverse and large departments, agencies, and systems.
- Meeting compliance requirements in place to access data and systems within an agency. Especially as ZT may require significant changes to your existing policies and procedures.
- The level of collaboration and coordinator across different departments and agencies, especially with each department’s own prioritization of tasks.
Each agency’s journey and solution will be unique. With such a vast array of challenges and options, how can agencies get started? This session will discuss the specific challenges Federal agencies have run into and how they’ve been able to support their zero trust goals as we start off 2023!

Dr. Mark Stanley
Enterprise Cybersecurity Architect, National Aeronautics and Space Administration

Jodi Kouts
Senior Advisor for Policy, IM-1, Office of the Chief Information Officer, U.S. Department of Energy

Conrad Bovell
Branch Chief, Cybersecurity Advisory and Strategy, Office of Information Security, U.S. Department of Health and Human Services

Alyssa Feola
Cybersecurity Advisor Technology Transformation Services, Federal Acquisition Service, U.S. General Services Administration

Jean-Paul Bergeaux
Federal Chief Technology Officer, GuidePoint Security

Moderator: Joe Franco
Director of Programs, MeriTalk
10:00 AM
Emerging Technology Talk
Zeroing In on Zero Trust – Why Federal Agencies Must Take a Threat informed Defense Approach
To keep pace with threat actors, Federal Agencies must codify and automate MITRE ATT&CK and D3FEND knowledge into security operations workflows and playbooks to understand and identify where gaps exist in cyber defense capabilities. This is essential in formalizing the right Zero Trust strategies to protect critical mission functions and capabilities. These strategies must be informed by near-time signal analytics, actionable threat intel and high-fidelity user behavior analytics to zero-in on threat actor activity. Implementing the right strategies to mature Zero Trust capabilities and improve cyber defense can be the difference in avoiding a major data breach.
In this session you will hear from OpenText Public Sector CTO, Kevin E. Greene as he provides valuable content and things to consider in your zero trust journey.

Kevin Greene
Public Sector Chief Technology Officer, OpenText Cybersecurity

10:15 AM
Visionary Panel: All Hands on Deck: Implementing Zero Trust Architecture
The paradigm shift over the past decade and a half has had a crucial impact on agencies’ current environment of the pandemic response. Even the definition of “perimeter” itself has transformed over time. Current mandated practices as well as fading out older models of Zero Trust have been challenging times but are calling for new practices, and Zero Trust framework in the future of cybersecurity. Finding the pathway to implement Zero Trust Architecture is a challenge within itself and figuring out where to begin will be an all hands on deck situation.
Listen in as topic experts explain how they began their Zero Trust Architecture implementation process, in addition to the challenges that may have floated in their path.

Tony Plater
Chief Information Security Officer (Acting), Office of the Chief Information Officer, Under Secretary of the Navy, U.S. Department of the Navy

Dr. Sean Cortopassi
Division Director, Program Systems Management Office, U.S. Department of Housing and Urban Development

Jane Zentmyer
Director for the Architecture and Transformation Division, Office of Inspector General, U.S. Department of Health & Human Services

Michele Thomas
Chief Information Security Officer, Office of the Under Secretary, Science and Technology Directorate, U.S. Department of Homeland Security

Kelvin Brewer
Director, Public Sector Sales Engineering, ForgeRock

Moderator: Derek Johnson
Senior Reporter, SC Magazine
11:00 AM
Emerging Technology Talk
ZTNA 2.0 at Palo Alto Networks: How We Secure Our Hybrid Workforce
In this session we’ll discuss Zero Trust and ZTNA, how they relate to each other, and how Palo Alto Networks uses ZTNA 2.0. As a security company and a first customer of our own products, we leverage a Zero Trust architecture as well as ZTNA 2.0 principles not only to manage our hybrid workforce, but also to protect our “crown jewels”—our intellectual property, customer data and employee data.

Wayne LeRiche
Field Chief Technology Officer - Federal Civilian, Palo Alto Networks

11:00 AM
Emerging Technology Talk
Securing NPE’s with a Control Plane for Machine Identity Management
As agencies continue to plan, execute, and adapt their zero trust strategies, securing the non-person entities (NPEs) across the mix of classic and modern architectures demands its own control plane. In this session, learn how a Machine Identity Management Control Plane is helping agencies gain visibility, analytics, governance, automation and orchestration of their machine identities from digital certificates to software supply chains.

Nick Curcuru
Head of Solutions Marketing, Venafi

11:15 AM
Visionary Panel: The Clock is Ticking: Zero Trust and Executive Requirements
It has been over a year since the Biden Administration released the federal government’s zero trust strategy. Federal agencies have wasted little time getting to work to meet the end of fiscal year 2024 deadline but there’s still lots of work left to do.
Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life. The Federal Government must bring to bear the full scope of its authorities and resources to protect and secure its computer systems, whether they are cloud-based, on-premises, or hybrid. But, where did Federal agencies start their journey?
Listen in as top Federal leaders discuss the steps they’ve taken to meet Zero Trust requirements and where they’re heading in 2023.

Gerry Caron III
Chief Information Officer, International Trade Administration, U.S. Department of Commerce

Daniel Dister
Deputy Director, Office of the Enterprise Chief Information Security Officer, Bureau of Information Resource Management, U.S. Department of State

Eric Sanders
Chief Information Security Officer, Office of Intelligence and Analysis, U.S. Department of Homeland Security

Sean Connelly
Trusted Internet Connections (TIC) Program Manager and Senior Cybersecurity Architect, Cybersecurity Division, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Brian Dennis
Principal Technologist, Akamai

Moderator: Nihal Krishan
Tech Reporter, CyberScoop, FedScoop
11:45 AM
Lunch | Emerging Technology Showcase
1:15 PM
Visionary Keynote Briefing

Col. Gary Kipe
Deputy Director, Zero Trust Portfolio Management Office for the Department of Defense Chief Information Office, Cyber Security Directorate, U.S. Department of Defense
1:30 PM
Visionary Panel: Identity Access and Zero Trust – How Federal Agencies are Handling Remote Security
In the age of the cloud, cybersecurity can no longer be defined by the perimeter of a network. This has become more apparent than ever as millions of Federal workers were sent home in March 2020 when the pandemic enforced social distancing. Many Federal employees still work remotely or hybrid, today.
A zero-trust security architecture is one where users on a network are not trusted by default and instead are required to provide credentials and earn authorization, typically with continuous validation, anytime they move around a network. With remote and hybrid work, Identity and Access Management (IAM) becomes even more crucial. It is a foundational element of Zero Trust, following an integrated digital identity framework comprising solid IAM policies, permissions, and technologies becomes critical to the success of our Federal Zero Trust architecture.
Topic experts will discuss the concepts of “never trust, always verify” when it comes to Identity Management and controlling access. They’ll address the importance of strengthening your ZTA, with remote workers in mind.

Melinda Rogers
Deputy Assistant Attorney General and Chief Information Officer, Information Resources Management, Justice Management Division, U.S. Department of Justice

Wayne Rodgers
Zero Trust Lead, Office of the Chief Information Officer, U.S. Department of Education

Ross Foard
ICAM Subject Matter Expert, Continuous Diagnostics and Mitigation Program, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Param Soni
Chief Information Officer, Office of the Chief Information Officer, Bureau of Economic Analysis, U.S. Department of Commerce

André Mendes
Chief Information Officer, U.S. Department of Commerce

Sean Frazier
Senior Director & Federal Chief Security Officer, Okta

Moderator: Tom Suder
Founder / CEO, ATARC
2:05 PM
Emerging Technology Talk
Simplifying the Complexity of Zero Trust
Join us while we explore simplifying zero trust methodologies through focusing on data security and achieving the freedom of control. We will discuss real world examples of daily computing challenges that are faced globally and often overlooked, while highlighting innovative solutions to these problems.

Jim Coyle
Federal Security Strategist, Lookout

2:12 PM
Emerging Technology Talk
The 4th Pillar of Zero Trust: Dedicated Application Security Testing at Scale
A critical component to moving the Federal Government to a Zero Trust framework involves agencies routinely testing applications and workloads. Memorandum 22-09 requires conducting dedicated application security testing, working with third parties for security testing evaluation, and maintaining an effective public VDP. In this session, we’ll discuss ways that agencies are using strategic security testing to surpass the requirements in M-22-09 while identifying the root causes of vulnerability flares and patterns observed in their APIs, cloud, host & web environments.

Scott Ormiston
Federal Solutions Architect, Synack

2:20 PM
Visionary Panel: The Future of Zero Trust Within the Federal Government
As the workforce has had to transition to teleworking, the importance of Zero Trust Security has skyrocketed. Zero Trust has become an enabler of the remote workforce along with traditional network security models. Zero Trust is better equipped to perform, and therefore better suited for aiding organizations maintaining a hybrid working model.
One frequently overlooked obstacle to switching to a zero-trust cybersecurity model is the need for ongoing administration. Zero-trust models rely on a vast network of strictly defined permissions, but companies are always evolving.
Listen in as Federal topic experts explore the current status of Zero Trust, ways to strengthen Zero Trust, as well as how they are moving to implement zero-trust architecture and the challenges that agencies can face while keeping pace with the ongoing federal requirements.. Where do these topic experts think Zero Trust can improve on? What best strategies will help improve on these issues?

Jonathan White
Zero Trust Lead, Cloud & Data Branch Chief, U.S. Coast Guard

Dr. Amy Hamilton
Senior Cybersecurity Advisor Policy and Programs, Office of Cybersecurity and CISO, Office of the Chief Information Officer, U.S. Department of Energy

Don Coulter
Senior Science Advisor, Cybersecurity, Office of Science and Engineering, Science and Technology Directorate, U.S. Department of Homeland Security

Peter Romness
Cybersecurity Principal, CISO Advisors, Cisco

Moderator: Justin Doubleday
Reporter, Federal News Network, WTOP-FM
Watch On Demand
Media Partners
By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy. By registering for this event you agree to receive event reminders via email, text, and/or phone call communications.

