
2022 ATARC Federal Security Breakfast Summit
April 14, 2022, 7:30 AM - 12:00 PM ET | Marriott Metro Center, Washington DC3.5 CPE Credits Available for this Event***
7:30 AM
Registration | Breakfast
8:00 AM
Visionary Keynote

Gerald Caron
Assistant Inspector General/Chief Information Officer, Office of Management and Policy, U.S. Department of Health and Human Services
8:15 AM
Emerging Technology Tech Talk
Zero Trust Implementation Approaches: Pillars vs Use Cases
Many of the great minds on Zero Trust talk about an implementation model that focuses on
individual pillars and individual architectural pieces, such as the Identity Pillar. GuidePoint
Security likes to take a “Use Case” or “Workflow” approach. Looking for paths of access that
can be separated or segmented from the rest of the environment and focused on independently.
However, this sometimes can look like a pillar being implemented, particularly in the identity
space. We will talk about the two different approaches and one Use Case, using Ping Identity,
that could be considered a hybrid of both approaches and is specifically called out in OMB
memo M22-09.

Jean-Paul Bergeaux
Federal CTO, GuidePoint Security

8:30 AM
Panel: Securing the Cloud Through Zero Trust
As agencies look to replace legacy systems with the cloud, Zero Trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud.
In what ways has Zero Trust security helped to secure the cloud? Why is it important to protect the data stored within the cloud? Federal IT leaders will discuss the process of securing the cloud through Zero Trust and explain the importance of doing so within the Federal Government. Listen in as panelists also discuss how Federal Agencies and cloud service providers can work together to enhance security, and why it’s important to focus on protecting data instead of the network.

Nicole Willis
Chief Technology Officer, Office of Management and Policy, Office of Inspector General, United States Department of Health and Human Services

Jonathan Alboum
Federal CTO and Principal Digital Strategist, Federal Government, ServiceNow

Moderator: Tom Temin
Anchor and Columnist, Federal News Network
9:15 AM
Emerging Technology Showcase
9:30 AM
Panel: Advancing Federal Cybersecurity to Protect Against Cyber-Attacks
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Listen into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. What are some best strategies for discovering devices, tracking behavior, detecting threats, and taking action to protect their enterprise?
Hear from topic experts as they dive into the best practices for securing their agency’s IoT and their legacy systems. What emerging technologies will help these agencies ensure their systems will be protected against cyber-attacks? What does it look like for an agency to adopt and implement these new ways to protect against cyber threats?

Gregory Bird
Mission Systems Branch Chief, Cybersecurity and Infrastructure Security Agency

Kenneth Miltenberger
Cyber Operational Assessments Branch Chief, CGCYBER, U.S. Coast Guard

Moderator: Lamar Johnson
Tech Reporter, MeriTalk
10:15 AM
Emerging Technology Showcase
10:45 AM
Panel: Embracing a Zero Trust Security Model
Zero Trust security is led by the principle of “never trust, always verify.” It is a framework of policies, technologies, and systems that are applied to users and devices. Tune into this panel as topic experts dive into the importance of Zero Trust security, what it means to the Federal Government, and how best to embrace this model of security. Listen in as panelists dive into what can be addressed with a Zero Trust Architecture. What best strategies do these topic experts have on implementing this security model, as well as getting the most out of it?

Gregory Bird
Mission Systems Branch Chief, Cybersecurity and Infrastructure Security Agency

Stuart Pickard
Senior Director, North America Sales Engineering, Menlo Security

Dave Nyczepir
Tech Reporter, FedScoop
Watch on demand:
By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy.

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly.

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org