Loading Events

ATARC Cybersecurity Executive Order Breakfast Summit

November 8, 2022, 7:30 AM - 12:00 PM ET | Marriott Metro Center, Washington DC

4.0 CPE Credits Available for this Event***

Register Partnership Opportunities
}

7:30 AM

Registration

}

8:00 AM

Visionary Keynote Briefing

Robert J. "Bob" Costello

Robert J. "Bob" Costello

Chief Information Officer, Office of the Chief Information Officer, Office of the Director, United States Department of Homeland Security (Pending Approval)

}

8:30 AM

Visionary Panel: Past, Present, and Future: Unpacking the Executive Order

Cyber threats are evolving at such rates that Federal training of cybersecurity practitioners are struggling to keep up. The continued cybersecurity push across government and industry, it is increasingly important for organizations to have proactive cyber plans in place. As the nation looks to recover from a once-in-a-century pandemic and increasingly more sophisticated cyberattacks, the U.S. government must ensure that it can secure its networks and data against evolving threats and provide resilient services to Americans during this new normal. 

Tune into this panel to hear as topic experts discuss the importance of how organizations should be proceeding with the requirements of the Cybersecurity Executive Order and how the workforce has been affected by it. What best practices do these topic experts recommend to help best protect security? What are some key tools and procedures that can be implemented? What legislation and funding are currently in place within the government? And where is the cybersecurity workforce headed?

Carole House

Carole House

Director for Cybersecurity and Secure Digital Innovation, Cybersecurity, National Security Council Staff, Executive Office of the President (Invited)

Jamie Holcombe

Jamie Holcombe

Chief Information Officer, United States Patent and Trademark Office (Invited)

Shane Barney

Shane Barney

Chief Information Security Officer, United States Citizenship and Immigration Services/Department of Homeland Security (Invited)

Jonathan Fiebus

Jonathan Fiebus

Chief Information Security Officer and Deputy Director, Nuclear Regulatory Commission (Invited)

Moderator: Amy Kluber

Moderator: Amy Kluber

Editor in Chief, GovernmentCIO (Invited)

}

9:45 AM

Panel: Untrusted until Trust is Established: The Components of Zero-Trust

While traditional network security models have assumed endpoints and users within organization networks can be implicitly trusted, the zero-trust approach takes into account scenarios like threat actors that have stolen legitimate account credentials as well as insider threats. This type of model encourages continual monitoring and authentication of each endpoint under the premise that no actor, system, network or service within the “security perimeter” can be trusted. 

Zero-trust cybersecurity may eventually lead to superior security, but along the way, it can put companies at greater risk. One frequently overlooked obstacle to switching to a zero-trust cybersecurity model is the need for ongoing administration. Zero-trust models rely on a vast network of strictly defined permissions, but companies are always evolving. People move into new roles and change locations. Access controls must be updated each time to ensure the correct people have access to specific information. Keeping the permissions accurate and up to date requires ongoing input.

Tune into this panel to hear Federal topic experts discuss how they are moving to implement zero-trust architecture and the challenges that agencies can face while keeping pace with the ongoing federal requirements.

Sean Connelly

Sean Connelly

TIC Program Manager and Senior Cybersecurity Architect, Cybersecurity and Infrastructure Security Agency (Invited)

Paul Blahusch

Paul Blahusch

Chief Information Security Officer, United States Department of Labor (Invited)

John F. “Jack” Donnelly

John F. “Jack” Donnelly

Chief Information Security Officer, Information Technology Services, Office of the Comptroller of the Currency, United States Department of the Treasury (Invited)

Dr. Gregory “Greg” Edwards

Dr. Gregory “Greg” Edwards

Chief Information Security Officer, Office of the Chief Information Security Officer, Federal Emergency Management Agency, United States Department of Homeland Security (Invited)

Moderator: Jason Miller

Moderator: Jason Miller

Executive Editor/Reporter, Federal News Network, WTOP-FM (Invited)

}

11:00 AM

Panel: Prioritizing Improvements to Your Software Supply Chain Security

Traditional security efforts have centered around securing the perimeter, and the responsibility for security is increasingly falling to developers. Specifically, a key element of the Executive Order is focused on making sure federal agencies are NIST 800-53 compliant within their software supply chain security. 

In order to secure the software supply chain, that entails knowing exactly what components are being used in your software products—everything that impacts your code as it goes from development to production.

Tune into this panel to hear as topic experts discuss how they are enforcing their supply chain security and what risks/benefits come along with that. What are these agencies doing to make sure they are NIST 800-53 compliant? What are the biggest threats to supply chain security? How does the vendor assess the security of its software? 

Donna S. Bennett

Donna S. Bennett

Chief Information Security Officer, Office of the Enterprise Chief Information Security Officer, Bureau of Information Resource Management, United States Department of State (Invited)

Blair Heiserman

Blair Heiserman

Chief Technology Security Officer, National Institute of Standards and Technology (Invited)

Davon Tyler

Davon Tyler

Chief Information Security Officer, Information Technology Directorate, United States Mint, United States Department of the Treasury (Invited)

Alvin A. “Tony” Plater

Alvin A. “Tony” Plater

Chief Information Security Officer (Acting), Office of the Chief Information Officer, Under Secretary of the Navy, United States Department of the Navy (Invited)

Moderator: Frank Konkel

Moderator: Frank Konkel

Executive Editor, Government Executive Media Group (GovExec) (Invited)

Register

By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy.

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Live. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.