Registration | Breakfast
Welcome and Opening Remarks
Founder / CEO, ATARC
Visionary Keynote Briefing
Deputy Chief Information Security Officer and Executive Director, Cybersecurity Integration, Logistics, and Planning, Office of Information and Technology, United States Department of Veterans Affairs (Pending Agency Approval)
Visionary Panel: Supporting Your Agencies’ Zero Trust Goals
Implementing and staying up to date with your agency’s zero trust model can be challenging for a few reasons. Top three challenges that Federal agencies are facing includes:
- Complexity of implementing a zero trust model across a network with many diverse and large departments, agencies, and systems.
- Meeting compliance requirements in place to access data and systems within an agency. Especially as ZT may require significant changes to your existing policies and procedures.
- The level of collaboration and coordinator across different departments and agencies, especially with each department’s own prioritization of tasks.
Each agency’s journey and solution will be unique. With such a vast array of challenges and options, how can agencies get started? This session will discuss the specific challenges Federal agencies have run into and how they’ve been able to support their zero trust goals as we start off 2023!
Dr. Mark Stanely
Enterprise Cybersecurity Architect, National Aeronautics and Space Administration
Chief Information Security Officer, Office of Information Security, Office of Digital Transformation, United States Department of Health and Human Services (Invited)
Chief Information Security Officer Cyber Security, Office of Management, United States Department of the Treasury (Invited)
Chief Information Security Officer, Office of the Chief Information Officer, Department of Administration and Finance, Millennium Challenge Corporation
Managing Editor, StateScoop, Scoop News Network (Invited)
Visionary Panel: All Hands on Deck: Implementing Zero Trust Architecture
The paradigm shift over the past decade and a half has had a crucial impact on agencies’ current environment of the pandemic response. Even the definition of “perimeter” itself has transformed over time. Current mandated practices as well as fading out older models of Zero Trust have been challenging times but are calling for new practices, and Zero Trust framework in the future of cybersecurity. Finding the pathway to implement Zero Trust Architecture is a challenge within itself and figuring out where to begin will be an all hands on deck situation.
Listen in as topic experts explain how they began their Zero Trust Architecture implementation process, in addition to the challenges that may have floated in their path.
Chief Information Security Officer (Acting), Office of the Chief Information Officer, Under Secretary of the Navy, United States Department of the Navy
Dr. Sean Cortopassi
Director, Information Management and Cybersecurity Assurance Division, Office of Program Systems Management, Assistant Secretary for Housing - Federal Housing Administration, United States Department of Housing and Urban Development (Pending Agency Approval)
Deputy Commander, U.S. Army Command and Control Support Agency, G-3/5/7 Operations and Plans, United States Department of the Army (Pending Agency Approval)
Deputy Assistant Secretary, Chief Information Security Officer Office of Information Security, Office of Information and Technology, United States Department of Veterans Affairs (Invited)
Director, Public Sector Sales Engineering, ForgeRock
Senior Reporter, SC Magazine
Visionary Panel: The Clock is Ticking: Zero Trust and Executive Requirements
It has been over a year since the Biden Administration released the federal government’s zero trust strategy. Federal agencies have wasted little time getting to work to meet the end of fiscal year 2024 deadline but there’s still lots of work left to do.
Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life. The Federal Government must bring to bear the full scope of its authorities and resources to protect and secure its computer systems, whether they are cloud-based, on-premises, or hybrid. But, where did Federal agencies start their journey?
Listen in as top Federal leaders discuss the steps they’ve taken to meet Zero Trust requirements and where they’re heading in 2023.
Chief Information Security, Officer Office of the Chief Information Officer, United States Office of Personnel Management (Invited)
Director Directorate of Science and Technology, Central Intelligence Agency, Office of the Director of National Intelligence (Invited)
Chief Information Security Officer, Office of Intelligence and Analysis, United States Department of Homeland Security (Pending Agency Approval)
Trusted Internet Connections (TIC) Program Manager and Senior Cybersecurity Architect, Cybersecurity Division, Cybersecurity and Infrastructure Security Agency, United States Department of Homeland Security (Pending Agency Approval)
Reporter, Politico Pro Cybersecurity, POLITICO (Invited)
Lunch | Emerging Technology Showcase
Visionary Keynote Briefing
Col. Gary Kipe
Deputy Director, Zero Trust Portfolio Management Office for the Department of Defense Chief Information Office, Cyber Security Directorate, United States Department of Defense
Visionary Panel: Identity Access and Zero Trust – How Federal Agencies are Handling Remote Security
In the age of the cloud, cybersecurity can no longer be defined by the perimeter of a network. This has become more apparent than ever as millions of Federal workers were sent home in March 2020 when the pandemic enforced social distancing. Many Federal employees still work remotely or hybrid, today.
A zero-trust security architecture is one where users on a network are not trusted by default and instead are required to provide credentials and earn authorization, typically with continuous validation, anytime they move around a network. With remote and hybrid work, Identity and Access Management (IAM) becomes even more crucial. It is a foundational element of Zero Trust, following an integrated digital identity framework comprising solid IAM policies, permissions, and technologies becomes critical to the success of our Federal Zero Trust architecture.
Topic experts will discuss the concepts of “never trust, always verify” when it comes to Identity Management and controlling access. They’ll address the importance of strengthening your ZTA, with remote workers in mind.
Deputy Assistant Attorney General and Chief Information Officer, Information Resources Management, Justice Management Division, United States Department of Justice (Pending Agency Approval)
Zero Trust Lead, Office of the Chief Information Officer, United States Department of Education (Pending Agency Approval)
ICAM Subject Matter Expert, Continuous Diagnostics and Mitigation Program, Cybersecurity and Infrastructure Security Agency, United States Department of Homeland Security (Pending Agency Approval)
Chief Information Officer, Office of the Chief Information Officer, Bureau of Economic Analysis, United States Department of Commerce (Pending Agency Approval)
Chief Information Officer, Office of the Chief Information Officer, Office of the Secretary, United States Department of Commerce
Senior Director & Federal Chief Security Officer, Okta
Moderator: Tobias Naegele
Editor-in-Chief, Air and Space Magazine
Visionary Panel: The Future of Zero Trust Within the Federal Government
As the workforce has had to transition to teleworking, the importance of Zero Trust Security has skyrocketed. Zero Trust has become an enabler of the remote workforce along with traditional network security models. Zero Trust is better equipped to perform, and therefore better suited for aiding organizations maintaining a hybrid working model.
One frequently overlooked obstacle to switching to a zero-trust cybersecurity model is the need for ongoing administration. Zero-trust models rely on a vast network of strictly defined permissions, but companies are always evolving.
Listen in as Federal topic experts explore the current status of Zero Trust, ways to strengthen Zero Trust, as well as how they are moving to implement zero-trust architecture and the challenges that agencies can face while keeping pace with the ongoing federal requirements.. Where do these topic experts think Zero Trust can improve on? What best strategies will help improve on these issues?
Zero Trust Lead, Cloud & Data Branch Chief, United States Coast Guard (Pending Agency Approval)
Chief Information Security Officer, Information Assurance Division, Office of the Chief Information Officer, United States Department of the Interior (Invited)
Ja'Nelle L. DeVore
Chief Information Security Officer, Information Security Center, Office of the Chief Information Officer, United States Department of Agriculture (Invited)
Chief Information Security Officer, Office of Headquarters Services, Office of Strategic Infrastructure, National Aeronautics and Space Administration (Invited)
Reporter, Federal News Network, WTOP-FM