
ATARC’s Mission Critical Identity Security Virtual Summit
In partnership with
and 
February 1, 2022, 10:00 AM – 12:15 PM ET
2.5 CPE Credit Available for this Event***
10:00 AM
Visionary Keynote

Gerald J. Caron III
Chief Information Officer (CIO), Assistant Inspector General for Information Technology (AIG/IT), Office of the Inspector General (OIG), Department of Health and Human Services (HHS)
10:15 AM
Panel: Zero Trust and the Federal Identity-Centric Security Roadmap
In today’s digital world, identity is the new perimeter. To meet the access and usability demands of modern users, agencies are moving towards a more robust and comprehensive security posture that’s centered around the zero-trust principle of “never trust, always verify.” This requires agencies to ensure the RIGHT people have access to the RIGHT data, at the RIGHT time, only when needed or contextual parameters are met.
Tune into this panel to hear from topic experts as they explore how the Federal Identity-Centric Security Roadmap fits in with the advancement of Zero Trust Security. What does the concept of never trust, always verify mean? What are some best practices for verifying users in your network? What challenges have these topic experts experienced as they incorporate Zero Trust within their Federal Identity-Centric Security Roadmap? What solutions have these topic experts come up with?

Ken Myers
Chief Federal ICAM Architect, General Services Administration

Sean Connelly
TIC Program Manager and Senior Cybersecurity Architect, Cybersecurity Division, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Ida Mix
Chief Information Security Officer, Bureau of Industry and Security, U.S. Department of Commerce

Josh Brodbent
RVP, Public Sector Solutions Engineering, BeyondTrust

Moderator: Jason Miller
Executive Editor, Federal News Network
10:45 AM
Technology Talk
The Role of Privileged Access Management within a Modern Enterprise Identity Program
A foundation of Zero Trust is identity. With the dissolution of the traditional network perimeter, identity has become the primary and most critical line of defense. Within any identity strategy, privileged access and users must be treated as a special use case. It’s estimated that approximately 80% of hacking-related security breaches involve the misuse of privileged credentials. Join BeyondTrust for a Tech Talk to understand how our Universal Privilege Management platform enables trusted access across your agency by securing and managing privilege across every identity, user, session, and asset.

Morey J. Haber
Chief Security Officer, BeyondTrust

11:00 AM
Panel: Take Control of Privileged Access Before Attackers Do
Privileged Access Management (PAM) controls are essential to explore when building any Zero Trust security posture. Almost every attack today involves a stolen identity or privilege to execute and initially compromise an environment, or to move laterally within a network.
Applying the principle of least privilege (PoLP) is a powerful and well-recognized way to secure agency systems. It ensures elevated access is only given when contextual parameters are met and is immediately revoked after the activity is performed or the context has changed.
Tune into this panel as security experts to discuss how PAM controls can help minimize your agency’s attack surface and cyber risk, while also empowering agency program requirements such as ICAM and Secure Data Sharing. What best practices do these topic experts have for using PAM to build Zero Trust Architecture? What does this look like?

Trafenia Salzman
Security Architect, U.S. Small Business Administration

Sanjay Gupta
Chief Technology Officer, Office of the Chief Information Officer, Office of the Administrator, United States Small Business Administration

Robert Wood
Chief Information Security Officer and Director, Information Security and Privacy Group, Centers for Medicare and Medicaid Services, United States Department of Health and Human Services

Josh Brodbent
RVP, Public Sector Solutions Engineering, BeyondTrust

Moderator: Jory Heckman
Reporter, Federal News Network
11:30 AM
Technology Talk
SailPoint Identity Security: Making the mission possible
There is no doubt that Identity is a critical foundation to Zero Trust but there are many different identity domains. During this brief yet informative session, we will unpack how Identity Security, the Federal, Identity Credential and Access Management (FICAM) pillars, and the CDM Master User Record (MUR) provide the foundation for modern security architecture. We’ll discuss how agencies can optimize their existing ICAM and CDM investments to enable visibility, governance, and control of identities and data in the rapidly changing security ecosystem.

Frank Briguglio
Global Public Sector Strategist, SailPoint
11:45 AM
Panel: Intelligently Manage Access with Identity Centric Security
The seismic shift to distributed workforces has dissolved the federal government’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk.
Tune into this panel to hear from topic experts on how to build an effective zero trust approach with an emphasis on identity and privileged access management. How does identity and privileged access management align with and enable Zero Trust? How does Zero Trust help agencies achieve ICAM Cybersecurity goals?

Carole House
Director for Cybersecurity and Secure Digital Innovation for the White House National Security Council

Grant Dasher
Office of the Technical Director for Cyber at the Cybersecurity and Infrastructure Security Agency

Jeffery Shilling
Chief Information Officer (Acting), Center for Biomedical Informatics and Information Technology, National Institutes of Health, United States Department of Health and Human Services

Frank Briguglio
Global Public Sector Strategist, SailPoint

Moderator: Dave Nyczepir
Tech Reporter, Fed Scoop
Watch on demand:

