Loading Events

ATARC’s Mission Critical Identity Security Virtual Summit

In partnership with  and

February 1, 2022, 10:00 AM – 12:15 PM ET

2.5 CPE Credit Available for this Event*** 

}

10:00 AM

Visionary Keynote

Gerald J. Caron III

Gerald J. Caron III

Chief Information Officer (CIO), Assistant Inspector General for Information Technology (AIG/IT), Office of the Inspector General (OIG), Department of Health and Human Services (HHS)

}

10:15 AM

Panel: Zero Trust and the Federal Identity-Centric Security Roadmap

In today’s digital world, identity is the new perimeter. To meet the access and usability demands of modern users, agencies are moving towards a more robust and comprehensive security posture that’s centered around the zero-trust principle of “never trust, always verify.” This requires agencies to ensure the RIGHT people have access to the RIGHT data, at the RIGHT time, only when needed or contextual parameters are met.

Tune into this panel to hear from topic experts as they explore how the Federal Identity-Centric Security Roadmap fits in with the advancement of Zero Trust Security. What does the concept of never trust, always verify mean? What are some best practices for verifying users in your network? What challenges have these topic experts experienced as they incorporate Zero Trust within their Federal Identity-Centric Security Roadmap? What solutions have these topic experts come up with?

Ken Myers

Ken Myers

Chief Federal ICAM Architect, General Services Administration

Sean Connelly

Sean Connelly

TIC Program Manager and Senior Cybersecurity Architect, Cybersecurity Division, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Ida Mix

Ida Mix

Chief Information Security Officer, Bureau of Industry and Security, U.S. Department of Commerce

Josh Brodbent

Josh Brodbent

RVP, Public Sector Solutions Engineering, BeyondTrust

Moderator: Jason Miller

Moderator: Jason Miller

Executive Editor, Federal News Network

}

10:45 AM

Technology Talk

The Role of Privileged Access Management within a Modern Enterprise Identity Program

A foundation of Zero Trust is identity. With the dissolution of the traditional network perimeter, identity has become the primary and most critical line of defense. Within any identity strategy, privileged access and users must be treated as a special use case. It’s estimated that approximately 80% of hacking-related security breaches involve the misuse of privileged credentials. Join BeyondTrust for a Tech Talk to understand how our Universal Privilege Management platform enables trusted access across your agency by securing and managing privilege across every identity, user, session, and asset.

Morey J. Haber

Morey J. Haber

Chief Security Officer, BeyondTrust

}

11:00 AM

Panel: Take Control of Privileged Access Before Attackers Do

Privileged Access Management (PAM) controls are essential to explore when building any Zero Trust security posture. Almost every attack today involves a stolen identity or privilege to execute and initially compromise an environment, or to move laterally within a network.

Applying the principle of least privilege (PoLP) is a powerful and well-recognized way to secure agency systems. It ensures elevated access is only given when contextual parameters are met and is immediately revoked after the activity is performed or the context has changed.

Tune into this panel as  security experts to discuss how PAM controls can help minimize your agency’s attack surface and cyber risk, while also empowering agency program requirements such as ICAM and Secure Data Sharing. What best practices do these topic experts have for using PAM to build Zero Trust Architecture? What does this look like?

Trafenia Salzman

Trafenia Salzman

Security Architect, U.S. Small Business Administration

Sanjay Gupta

Sanjay Gupta

Chief Technology Officer, Office of the Chief Information Officer, Office of the Administrator, United States Small Business Administration

Robert Wood

Robert Wood

Chief Information Security Officer and Director, Information Security and Privacy Group, Centers for Medicare and Medicaid Services, United States Department of Health and Human Services

Josh Brodbent

Josh Brodbent

RVP, Public Sector Solutions Engineering, BeyondTrust

Moderator: Jory Heckman

Moderator: Jory Heckman

Reporter, Federal News Network

}

11:30 AM

Technology Talk

SailPoint Identity Security: Making the mission possible

There is no doubt that Identity is a critical foundation to Zero Trust but there are many different identity domains. During this brief yet informative session, we will unpack how Identity Security, the Federal, Identity Credential and Access Management (FICAM) pillars, and the CDM Master User Record (MUR) provide the foundation for modern security architecture. We’ll discuss how agencies can optimize their existing ICAM and CDM investments to enable visibility, governance, and control of identities and data in the rapidly changing security ecosystem.

Frank Briguglio

Frank Briguglio

Global Public Sector Strategist, SailPoint

}

11:45 AM

Panel: Intelligently Manage Access with Identity Centric Security

The seismic shift to distributed workforces has dissolved the federal government’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk.

 Tune into this panel to hear from topic experts on how to build an effective zero trust approach with an emphasis on identity and privileged access management. How does identity and privileged access management align with and enable Zero Trust? How does Zero Trust help agencies achieve ICAM Cybersecurity goals?

Carole House

Carole House

Director for Cybersecurity and Secure Digital Innovation for the White House National Security Council

Grant Dasher

Grant Dasher

Office of the Technical Director for Cyber at the Cybersecurity and Infrastructure Security Agency

Jeffery Shilling

Jeffery Shilling

Chief Information Officer (Acting), Center for Biomedical Informatics and Information Technology, National Institutes of Health, United States Department of Health and Human Services

Frank Briguglio

Frank Briguglio

Global Public Sector Strategist, SailPoint

Moderator: Dave Nyczepir

Moderator: Dave Nyczepir

Tech Reporter, Fed Scoop

Watch on demand:

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 
*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Internet Based. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.