Loading Events

ATARC Advancing Security Within the Federal Government Virtual Summit

October 14, 2021, 10:00 AM - 12:15 PM ET | 2.5 CPE Credits Available for this Event***
Register
}

10:00 AM

Visionary Keynote

Gerald J. Caron III

Gerald J. Caron III

Chief Information Officer and Assistant Inspector General for Information Technology, Office of the Inspector General, Department of Health and Human Services

}

10:15 AM

Emerging Technology Tech Talks

Understanding the 3 Essential Pillars: Cloud Native Security

With many organizations now deploying cloud native applications based on micro-services, using containers, VMs and serverless functions, they are faced with new security challenges and threats. Based on Aqua’s experience with hundreds of cloud native implementations since 2016, we’ve come to the realization that any cloud native security strategy must address these three areas – the build phase of applications, the infrastructure on which applications run, and the workloads themselves. In this talk we will show how this holistic approach creates an opportunity to automate and improve security to previously unattainable levels, and the agility and acceleration it enables to drive digital transformation and cloud enablement initiatives.

Jessy McDermott

Jessy McDermott

Solutions Architect, Aqua Security

7 Habits of Highly-Effective Vulnerability Management

How do you know your VM program is effective? In this video, Tim Erlin, VP of product management & strategy at Tripwire, highlights seven habits to help you get the most out of your efforts to manage and reduce vulnerability risk.

Tim Erlin

Tim Erlin

VP Strategy, Tripwire

}

10:30 AM

Panel: Advancing Federal Cybersecurity to Protect Against Cyber-Attacks

As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Tune into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. What are some best strategies for discovering devices, tracking behavior, detecting threats, and taking action to protect their enterprise?

Listen as topic experts dive into the best practices for securing their agency’s IoT and their legacy systems. What emerging technologies will help these agencies ensure their systems will be protected against cyber-attacks? What does it look like for an agency to adopt and implement these new ways to protect against cyber threats?

Robert Wood

Robert Wood

Chief Information Security Officer and Director, Centers for Medicare & Medicaid Services, U.S. Department of Health and Human Services

Davon Tyler

Davon Tyler

Chief Information Security Officer, U.S. Mint

Moderator: Jory Heckman

Moderator: Jory Heckman

Reporter, Federal News Network

}

11:15 AM

Emerging Technology Tech Talks

Modern Authentication for Tomorrow’s Federal Workforce

With NIST 800-63 Digital Identity Guideline guidance on FIDO expected in 2022, federal agencies should start thinking about modernizing authentication across internal and external applications and infrastructures today.
Username and password, and mobile-based authentication are weak alternatives to the PIV and CAC, especially for growing use cases such as remote and hybrid workers, non PIV/CAC eligible workers, mobile/BYOAD users, and citizen-facing digital services. NIST requires that multi-factor authentication be ‘verifier impersonation-resistant’, and outside of traditional PKI, FIDO2 and FIDO U2F are the only authentication standards that can securely augment the PIV and CAC while meeting NIST guidelines. 
Attend this session to learn how agencies can start modernizing today to meet the needs of federal authentication of tomorrow.

Jeff Frederick

Jeff Frederick

Manager Solutions Engineering, Yubico

}

11:30 AM

Panel: Embracing a Zero Trust Security Model

Zero Trust security is led by the principle of “never trust, always verify.” It is a framework of policies, technologies, and systems that are applied to users and devices. Tune into this panel as topic experts dive into the importance of Zero Trust security, what it means to the Federal Government, and how best to embrace this model of security.

Listen in as panelists dive into what can be addressed with a Zero Trust Architecture. What best strategies do these topic experts have on implementing this security model, as well as getting the most out of it?

Allison McCall

Allison McCall

Chief Information Officer, U.S. Department of Commerce

Samuel Michael

Samuel Michael

Chief, Information Technology Resources Branch, National Center for Advancing Translational Sciences

Kris Caylor

Kris Caylor

Associate Chief Information Security Officer, Office of Surface Mining Reclamation and Enforcement, U.S. Department of Interior

Joe Hamblin

Joe Hamblin

U.S. Federal CTO, ARMIS

Moderator: Kiersten Patton

Moderator: Kiersten Patton

Working Group Program Manager, ATARC

Watch on demand:

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 
*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Internet Based. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.