Colonel Edward Teague
G6 Office of the Chief Information Officer, Office of the Chief of Staff, U.S. Department of the Army (invited)
Panel: Keeping Hybrid Work Safe: The Importance of Identity Management
Many organizations still aren’t equipped with adequate security to prevent data theft and fraud, and most consumers lack the awareness that would help them safeguard their own digital identity. Threat actors have taken advantage of this cybersecurity gap, leveraging more sophisticated methods to steal personal information for profit or for their own malicious gain. With technology rapidly advancing and the continuation of the hybrid workforce, protecting sensitive data must be top of mind for both businesses and consumers.
Tune into this panel to hear as topic experts discuss the importance of Identity Management within federal agencies and how the hybrid workforce has affected it. What best practices do these topic experts recommend to help best protect data? How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?
Chief, Information Technology Resources Branch, Office of Administrative Management, National Institutes of Health, U.S. Department of Health and Human Services (invited)
Technical Director and Project Officer for Identity Access Management, U.S. Army
Chief Information Officer, U.S. Army Corps of Engineers (invited)
Chief Federal ICAM Architect, General Services Administration (pending approval)
Moderator: Jason Miller
Executive Editor, Federal News Network
Panel: Managing Millions of Machine Identities Across Hybrid Cloud Environments
The internet is used by millions of people every single day. And every person using a computer is using an online application or service to complete their goal. Every interaction that they have while online comes with thousands of other invisible machine-to-machine interactions that support the same work. These machines can be actual boxes, virtualized systems, containers and clusters, or they can be ephemeral serverless applications …. but they all have one thing in common. They each have a unique IDENTITY. This identity needs to be protected. And moreover, the number of these identities is growing at an exponential rate. This is the realm of an emerging and fast-moving infosec category, Machine Identity Management.
Tune into this session to hear from Federal Leaders on the unique challenges of managing these identities across hybrid cloud environments. What are the fundamental capabilities needed for enterprise-wide management of machine identities? Listen as subject matter experts address different Federal cloud use cases, as well as lessons learned throughout this process.
IT Specialist, Defense Counterintelligence and Security Agency (invited)
Executive Director of Identity, Technology Transformation Services, Federal Acquisition Service, United States General Services Administration (invited)
Deputy Chief Data O cer/Branch Chief, O ce of Intelligence & Analysis, U.S. Department of Homeland Security (invited)
Moderator: Melissa Harris
Senior Researcher, GovCIO
Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly.
*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org