Loading Events

 Presents

Defending Against Supply Chain Attacks

In partnership with 

March 30, 2021, 1:30-2:30 p.m.

1 CPE Credit Available for this Event*** 

An information-sharing event focused on building increased security through implementing microsegmentation architectures.

Panel: Defending Against Supply Chain Attacks

When faced with the increasingly frequent and damaging cyberattacks, it may feel like our current network perimeter defense is still relying on a ‘castle and moat’ like strategy. And this approach can in fact be an invitation for lateral movement of malware.

For proper cyber defense, we need to know more than just WHO can access the network from an identity management perspective. It is imperative to lock down the entire application attack vector. When malicious packets penetrate the network, they should not be able to access the organization’s high value assets (HVAs) – the applications and data deemed most critical. This scenario calls for a Zero Trust application-based security model that denies ALL, and only allows what is necessary.

This can be accomplished through host-based micro-segmentation – a methodology that establishes small and effective allowlists that indicate which applications and workloads can talk to each other. In a breach situation when malware tries to move laterally in an unauthorized manner, host-based micro-segmentation will effectively shut down all connections automatically, thus containing the breach to the original machine(s) affected.

Join the webinar to learn more about how micro-segmentation can reduce the network attack surface, improve breach containment and strengthen regulatory compliance. How can and why should Federal agencies shift to a Zero Trust security strategy? How can micro-segmentation help defend against advanced cyberthreats at a granular level? Hear about ways to overcome challenges in implementing better security strategies.

Dr. Tiina Rodrigue

Dr. Tiina Rodrigue

Chief Information Security Officer, Consumer Financial Protection Bureau (invited)

Roy Fernando

Roy Fernando

CyberSecOps, Information Security Division, U.S. Small Business Administration

Hemant Baidwan

Hemant Baidwan

Deputy Chief Information Security Officer (Acting), U.S. Department of Homeland Security (pending agency approval)

Traci Knight

Traci Knight

Deputy Chief Information Security Officer, Goddard Space Flight Center, National Aeronautics and Space Administration (invited)

Matt Glenn

Matt Glenn

Vice President of Product Management, Illumio

Moderator: Tom Suder

Moderator: Tom Suder

CEO, ATARC

Register Here:

Zoom enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Beginner, no prerequisites required. Advance preparation: none. Delivery Method: Group Live presented online due to COVID-19. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.