Gerald J. Caron III
Chief Information Officer and Assistant Inspector General for Information Technology, Office of the Inspector General, Department of Health and Human Services
Emerging Technology Tech Talks
Understanding the 3 Essential Pillars: Cloud Native Security
With many organizations now deploying cloud native applications based on micro-services, using containers, VMs and serverless functions, they are faced with new security challenges and threats. Based on Aqua’s experience with hundreds of cloud native implementations since 2016, we’ve come to the realization that any cloud native security strategy must address these three areas – the build phase of applications, the infrastructure on which applications run, and the workloads themselves. In this talk we will show how this holistic approach creates an opportunity to automate and improve security to previously unattainable levels, and the agility and acceleration it enables to drive digital transformation and cloud enablement initiatives.
Solutions Architect, Aqua Security
7 Habits of Highly-Effective Vulnerability Management
How do you know your VM program is effective? In this video, Tim Erlin, VP of product management & strategy at Tripwire, highlights seven habits to help you get the most out of your efforts to manage and reduce vulnerability risk.
VP Strategy, Tripwire
Panel: Advancing Federal Cybersecurity to Protect Against Cyber-Attacks
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Tune into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. What are some best strategies for discovering devices, tracking behavior, detecting threats, and taking action to protect their enterprise?
Listen as topic experts dive into the best practices for securing their agency’s IoT and their legacy systems. What emerging technologies will help these agencies ensure their systems will be protected against cyber-attacks? What does it look like for an agency to adopt and implement these new ways to protect against cyber threats?
Chief Information Security Officer and Director, Centers for Medicare & Medicaid Services, U.S. Department of Health and Human Services
Chief Information Security Officer, U.S. Mint
Moderator: Jory Heckman
Reporter, Federal News Network
Emerging Technology Tech Talks
Modern Authentication for Tomorrow’s Federal Workforce
With NIST 800-63 Digital Identity Guideline guidance on FIDO expected in 2022, federal agencies should start thinking about modernizing authentication across internal and external applications and infrastructures today.
Username and password, and mobile-based authentication are weak alternatives to the PIV and CAC, especially for growing use cases such as remote and hybrid workers, non PIV/CAC eligible workers, mobile/BYOAD users, and citizen-facing digital services. NIST requires that multi-factor authentication be ‘verifier impersonation-resistant’, and outside of traditional PKI, FIDO2 and FIDO U2F are the only authentication standards that can securely augment the PIV and CAC while meeting NIST guidelines.
Attend this session to learn how agencies can start modernizing today to meet the needs of federal authentication of tomorrow.
Manager Solutions Engineering, Yubico
Panel: Embracing a Zero Trust Security Model
Zero Trust security is led by the principle of “never trust, always verify.” It is a framework of policies, technologies, and systems that are applied to users and devices. Tune into this panel as topic experts dive into the importance of Zero Trust security, what it means to the Federal Government, and how best to embrace this model of security.
Listen in as panelists dive into what can be addressed with a Zero Trust Architecture. What best strategies do these topic experts have on implementing this security model, as well as getting the most out of it?
Chief Information Officer, U.S. Department of Commerce
Chief, Information Technology Resources Branch, National Center for Advancing Translational Sciences
Associate Chief Information Security Officer, Office of Surface Mining Reclamation and Enforcement, U.S. Department of Interior
U.S. Federal CTO, ARMIS
Moderator: Kiersten Patton
Working Group Program Manager, ATARC