Loading Events

ATARC Zero Trust Virtual Summit

November 17-18, 2021
AgendaRegister

Agenda

NOVEMBER 17

}

10:00 AM

Introduction

}

10-10:15 AM

Visionary Keynote Briefing

Gerald Caron

Gerald Caron

Chief Information Officer (CIO) / Assistant Inspector General for Information Technology (AIG/IT) at U.S. Department of Health and Human Services (HHS), Office of the Inspector General (OIG)

}

10:15-10:30 AM

Technology Talk

Hansang Bae

Hansang Bae

Field CTO, Netskope

}

10:30-11 AM

Visionary Panel: Using Emerging Technologies to Strengthen Zero Trust Security

Emerging Technologies are evolving at a faster pace than ever before, especially as agencies aim to implement Zero Trust Security. Throughout the adoption and integration of Zero Trust principles into any cybersecurity strategy comes with many challenges and questions, agencies must turn to emerging technologies to help with the adoption and integration process of Zero Trust.

Tune into this panel to hear from topic experts on the importance of emerging technologies while agencies are in the process of adopting and implementing Zero Trust Principles. In what ways do emerging technologies help this process? What best practices do these topic experts recommend when agencies are using emerging technologies to adopt and implement Zero Trust principles.

Kamran Khaliq

Kamran Khaliq

Chief Information Security Officer, United States Department of Health and Human Services (invited)

Jaime Holcombe

Jaime Holcombe

Chief Information Officer, U.S. Department of Commerce (invited)

Industry Speaker

Industry Speaker

Appgate

Moderator: Jory Heckman

Moderator: Jory Heckman

Reporter, Federal News Network (invited)

}

11-11:15 AM

Technology Talk

}

11:15-11:45 AM

Visionary Panel: The Future of Zero Trust Within the Federal Government

As the workforce has had to transition to teleworking, the importance of Zero Trust Security has skyrocketed. Zero Trust has become an enabler of the remote workforce and beyond. Zero Trust is better equipped to perform, and therefore better suited for aiding organizations maintaining a hybrid working model. This panel will focus on Zero Trust and how we need to be thinking differently about security, risk, & governance.

Listen in as topic experts explore the current status of Zero Trust, ways to strengthen Zero Trust, as well as what is in store for Zero Trust in the future. Where do these topic experts think Zero Trust can improve on? What best strategies will help improve on these issues?

Trafenia Salzman

Trafenia Salzman

Security Architect, Small Business Administration (invited)

Gregory Edwards

Gregory Edwards

Chief Information Security Officer, United States Department of Homeland Security (invited)

Industry Speaker

Industry Speaker

ForgeRock

Mark Rockwell

Mark Rockwell

Staff Writer, Federal Computer Weekly (invited)

}

11:45-11:52 AM

Technology Talk

}

11:53 AM-12 PM

Technology Talk

}

12-12:30PM

Visionary Panel: Understanding Cyber Threats Through the Use of Zero Trust

Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries. The Zero Trust security model eliminates implicit trust in any one element, node, or service and instead requires continuous verification of the operational picture via real-time information fed from multiple sources to determine access and other system responses. The Zero Trust security model assumes that a breach is inevitable or has likely already occurred, so it constantly limits access to only what is needed and looks for anomalous or malicious activity.

Tune into this panel to hear from topic experts on the best practices for understanding Cyber Threats through the use of Zero Trust. What best strategies do these topic experts have for eliminating cyber threats? How does the use of Zero Trust help in this process?

Andrea Simpson

Andrea Simpson

Chief Information Security Officer, Federal Communications Commission (invited)

Nickolous Ward

Nickolous Ward

Chief Information Security Officer at U.S. Department of Justice (invited)

Industry Speaker

Industry Speaker

Palo Alto

Aaron Boyd

Aaron Boyd

Senior Editor for Technology and Events, NextGov (invited)

}

12:30-12:45 PM

Technology Talk

}

12:45-1:15 PM

Visionary Panel: Securing the Cloud Through Zero Trust

As agencies look to replace legacy systems with the cloud, zero trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust Security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud. 

In what ways has Zero Trust Security helped to secure the cloud? Why is it important to protect the data stored within the cloud? Federal IT leaders will discuss the process of securing the cloud through Zero Trust and explain the importance of doing so within the Federal Government. Tune-in as Panelists also discuss how federal agencies and cloud service providers can work together to enhance security, and why it’s important to focus on protecting data instead of the network.

Randi Levin

Randi Levin

Chief Information Officer and Director for Information Technology, NASA (invited)

Kamesha Scarlett- Rosser

Kamesha Scarlett- Rosser

Chief Information Officer/Information Resources Management Chief, Chief Information Officer/Information Resources Management Chief (invited)

Moderator: Jordan Smith

Moderator: Jordan Smith

Reporter, Meritalk (invited)

}

1:15 PM

Closing Remarks

November 18

}

10 AM

Introduction

}

10-10:15 AM

Visionary Keynote Briefing

Sean Connelly

Sean Connelly

TIC Program Manager & Senior Cybersecurity Architect, Cybersecurity and Infrastructure Security Agency (invited)

}

10:15-10:30 AM

Technology Talk

}

10:30 -11 AM

Visionary Panel: Zero Trust and the Federal Identity-Centric Security Roadmap

The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk.

Tune into this panel to hear from topic experts on how to build an effective zero trust approach with an emphasis on identity and privileged access management. How does identity and privileged access management align with and enable Zero Trust? How does Zero Trust help agencies achieve ICAM Cybersecurity goals?

Sean Crago

Sean Crago

Information Management Officer, United States Department of State (invited)

Steven Babitch

Steven Babitch

Head of Artificial Intelligence, U.S. General Services Administration (invited)

Industry Speaker

Industry Speaker

BeyondTrust

Brandi Vincent

Brandi Vincent

Technology Reporter, Nextgov (invited)

}

11-11:15 AM

Technology Talk

}

11:15-11:45 AM

Visionary Panel: Applying and Implementing Zero Trust Principles

Implementing Zero Trust takes time and effort: it cannot be implemented overnight. For many networks, existing infrastructure can be leveraged and integrated to incorporate Zero Trust concepts, but the transition to a mature Zero Trust architecture often requires additional capabilities to obtain the full benefits of a Zero Trust environment.

Tune into this panel to hear from topic experts on the best practices for implementing Zero Trust within a government agency. What best strategies do these topic experts have for implementing and applying Zero Trust principles within an agency? What challenges have these experts had while implementing and applying these principles within their agency? What solutions did they come up with to overcome these challenges?

Jonathan Feibus

Jonathan Feibus

Chief Information Security Officer and Deputy Director, Nuclear Regulatory Commission (invited)

Michael Witt

Michael Witt

Associate Chief Information Officer for Cybersecurity and Privacy, NASA (invited)

Nicole Johnson

Nicole Johnson

Managing Editor, GovLoop (invited)

}

11:45-11:52 AM

Technology Talk

}

11:52 AM-12 PM

Technology Talk

}

12-12:30 PM

Visionary Panel: Government Guidances on Zero Trust

To help federal agencies convert their networks, systems and devices to a zero-trust security architecture, the White House has issued three new draft guidance documents. The documents, including the federal zero trust strategy from the Office of Management and Budget and a Zero Trust Maturity Model and Cloud Security technical reference architecture from the Cybersecurity and Infrastructure Security Agency, are meant to provide agencies with the roadmap and resources required to sustain a multiyear push towards zero trust.

Listen in as Topic Experts dive into the Guidances, as well as the importance behind them. How will these guidances affect Zero Trust Security? Do these guidances bring any challenges? What benefits do these guidances bring?

Matt Hartman

Matt Hartman

Deputy Executive Assistant Director, Cybersecurity and Infrastructure Security Agency (invited)

Mr. Chris DeRusha

Mr. Chris DeRusha

Federal Chief Information Security Officer, Office of Management and Budget (invited)

Industry Speaker

Industry Speaker

Splunk

Jason Miller

Jason Miller

Executive Editor, Federal News Network (invited)

}

12:30-12:45 PM

Technology Talk

}

12:45-1:15 PM

Visionary Panel: Adoption and Implementation of Zero Trust in Legacy Networks

The rise of digital transformation dictates that businesses move faster, innovate harder and adopt new technologies to remain competitive in their industries. Many times, it means implementation of systems using the latest IT innovation and methods. Moving to deploy a Zero Trust model is often triggered by digital transformation, understanding that the attack surface is increasing beyond what traditional security controls can maintain and secure.

Tune into this panel to hear topic experts discuss what it looks like to adopt and implement Zero Trust in Legacy Networks. How do you implement Zero Trust when you have an existing infrastructure? Where do you start? What are the best practices to do this?

Matt Easley

Matt Easley

Chief Information Security Officer (CISO), U.S. Army

Bradley Shepherd

Bradley Shepherd

Chief Data Officer, United States Department of Justice (invited)

Industry Speaker

Industry Speaker

Fidelis Security

Dave Nyczepir

Dave Nyczepir

Tech Reporter, Fedscoop

}

1:15 PM

Closing Remarks

Register