Loading Events

 Presents

Defending Against Supply Chain Attacks

In partnership with 

March 30, 2021, 1:30-2:30 p.m.

1 CPE Credit Available for this Event*** 

An information-sharing event focused on building increased security through implementing microsegmentation architectures.

Panel: Defending Against Supply Chain Attacks

When faced with the increasingly frequent and damaging cyberattacks, it may feel like our current network perimeter defense is still relying on a ‘castle and moat’ like strategy. And this approach can in fact be an invitation for lateral movement of malware.

For proper cyber defense, we need to know more than just WHO can access the network from an identity management perspective. It is imperative to lock down the entire application attack vector. When malicious packets penetrate the network, they should not be able to access the organization’s high value assets (HVAs) – the applications and data deemed most critical. This scenario calls for a Zero Trust application-based security model that denies ALL, and only allows what is necessary.

This can be accomplished through host-based micro-segmentation – a methodology that establishes small and effective allowlists that indicate which applications and workloads can talk to each other. In a breach situation when malware tries to move laterally in an unauthorized manner, host-based micro-segmentation will effectively shut down all connections automatically, thus containing the breach to the original machine(s) affected.

Join the webinar to learn more about how micro-segmentation can reduce the network attack surface, improve breach containment and strengthen regulatory compliance. How can and why should Federal agencies shift to a Zero Trust security strategy? How can micro-segmentation help defend against advanced cyberthreats at a granular level? Hear about ways to overcome challenges in implementing better security strategies.

Col. Gerard Acosta

Col. Gerard Acosta

Chief, Director's Initiative Group, Defense Logistics Agency

Roy Fernando

Roy Fernando

CyberSecOps, Information Security Division, U.S. Small Business Administration

Dr. Chase Cunningham

Dr. Chase Cunningham

Cybesecurity Expert, Author, former Forrester Principal Analyst – Zero Trust Wave

Matt Glenn

Matt Glenn

Vice President of Product Management, Illumio

Moderator: Kiersten Patton

Moderator: Kiersten Patton

Working Group Program Manager, ATARC

View on-demand:

Zoom enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Beginner, no prerequisites required. Advance preparation: none. Delivery Method: Group Live presented online due to COVID-19. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.