Loading Events

ATARC's Federal Zero Trust Summit - Spring

March 13, 2024, 7:30 AM - 3:00 PM ET | Marriott Marquis, Washington, D.C.

6.0 CPE Credits Available for this Event***

Register
}

7:30 AM

Registration   |    Breakfast

}

8:35 AM

Keynote Speaker

Gerald Caron III

Gerald Caron III

Chief Information Officer, International Trade Administration, United States Department of Commerce

}

8:50 AM

Fortifying Federal Cybersecurity: Harnessing Zero Trust Visibility and Analytics

In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to security breaches, limit potential damage, and ensure the integrity of critical government systems and data.

By establishing a holistic understanding of network dynamics and user interactions, agencies can make informed decisions, assess risks, and optimize cybersecurity measures. In a landscape characterized by evolving threats and complex attack vectors, leveraging advanced analytics to support zero trust principles equips federal government entities with a robust defense mechanism that safeguards national security and preserves public trust in the digital realm.

Karen Uttecht

Karen Uttecht

Technical Staff, MIT Lincoln Laboratory

Rudolf Rojas

Rudolf Rojas

Information Technology Manager, U.S. Department of Agriculture

Dr. Daniel Corbin

Dr. Daniel Corbin

Technical Director of the Command, Control, Communications, and Computers Division, Deputy Command for Information, U.S. Marine Corps

Shelly Hartsook

Shelly Hartsook

Deputy Associate Director for Capacity Building, Cybersecurity and Infrastucture Security Agency, U.S. Department of Homeland Security

Kevin Greene

Kevin Greene

Chief Technology Officer, Public Sector, Open Text Cybersecurity

David DiMolfetta

David DiMolfetta

Cybersecurity Reporter, NextGov/FCW

}

9:35 AM

Special Presentation

Update on the Zero Trust Portfolio Management Office
Dr. Les Call

Dr. Les Call

Director, CIO Zero Trust Portfolio Management Office, U.S. Department of Defense

}

10:05 AM

Emerging Technology Talk

Zero Trust PDP Current and Future State

Zero Trust represents a transformative philosophy shifting away from static, policy-
driven access models like RBAC, towards a dynamic approach rooted in real-time risk
evaluation across the five foundational pillars of the environment. Within the Zero Trust
architecture, these risk assessments occur within the Policy Decision Point (PDP), often
referred to as the “trust engine.” This presentation delves into the current state of PDP
development and outlines the necessary steps for Zero Trust to evolve from concept to practical
reality.

Jean-Paul Bergeaux

Jean-Paul Bergeaux

Federal Chief Technology Officer, GuidePoint Security

}

10:14 AM

Emerging Technology Talk

Beyond Compliance: Unlocking Agility and Innovation with Zero Trust

In the Federal Government, Zero Trust is often misperceived as a rigid set of
compliance mandates, stifling federal agencies' ability to innovate and meet evolving mission
needs. Let’s debunk the myth and discuss how a well-planned Zero Trust architecture can
become a powerful accelerator for government modernization. Attendees will explore how
Zero Trust principles streamline workflows, reduce operational friction, and create a secure
foundation for data-driven decision-making. The presentation will offer practical strategies for
overcoming implementation hurdles, fostering cultural buy-in, and leveraging Zero Trust to
boost both cybersecurity and federal workforce productivity.

Matt Topper

Matt Topper

President, Uberether

}

10:25 AM

Elevating Federal Security: Enforcing Zero Trust Workforce Protection

Delve into the imperative of implementing zero trust workforce security within the federal government framework. As remote work and digital collaboration become integral to operations, traditional security models fall short. The panel will underscore how adopting a zero trust approach, which entails rigorous identity verification, continuous monitoring, and context-based access, is pivotal in safeguarding government systems and data.

By prioritizing workforce security through zero trust principles, federal agencies can mitigate insider threats, secure sensitive information, and ensure operational continuity, even in an era of evolving cybersecurity challenges.

Edam Colón

Edam Colón

Cybersecurity Specialist,Information Assurance and Cybersecurity Division, Transportation Security Administration, U.S. Department of Homeland Security

Frank Indiviglio

Frank Indiviglio

Chief Technology Officer, National Oceanic and Atmospheric Administration, U.S. Department of Commerce

Eric Sanders

Eric Sanders

Chief Information Security Officer, Office of Intelligence and Analysis, U.S. Department of Homeland Security

Micah Maryn

Micah Maryn

Senior Solutions Engineer, Akamai

Justin Doubleday

Justin Doubleday

Reporter, Federal News Network

}

11:35 AM

Lunch in the Emerging Technology Showcase

 

}

12:30 PM

Visionary Keynote Briefing

Dr. Tiina Rodrigue

Dr. Tiina Rodrigue

Chief Information Security Officer, Consumer Financial Protection Bureau

}

1:00 PM

Emerging Technology Talk

Confidential Computing: Intrinsic Cloud Security to Lock Down Code and Data

What if your cloud infrastructure was intrinsically trustworthy? Join us for an insightful keynote
presentation exploring the pivotal role of Confidential Computing in advancing security
paradigms. We’ll unravel the essence of the next stage for zero trust architectures enabled by
impenetrable secure enclave technology. You will gain valuable insights into how public sector
organizations can leverage this cutting-edge technology to bolster defenses, foster trust, and
uphold the integrity of critical assets in an ever-evolving threat landscape.

Zach Sutton

Zach Sutton

Director of Public Sector, Anjuna

Dwayne Hoover

Dwayne Hoover

VP of Solutions Engineering, Anjuna

}

1:08 PM

Emerging Technology Talk

Bridging Zero Trust Principles to Identity Security Controls

Agencies are challenged with securing significantly more privileged accounts and supporting vastly larger remote, hybrid, and decentralized networks than in years past—many of them are not even considered traditional privileged accounts operated by administrators or system owners. Yet, almost every attack today requires privilege for the initial exploit or to laterally move within a network.

A zero trust architecture (ZTA) addresses modern privileged access security challenges by enforcing granular, secure, authorized access near the resources— whether located on-premises or in the cloud—for a remote workforce and vendors, based on an organization’s defined access policy.

In this session, we’ll share how your organization can extend privileged access security best practices beyond the perimeter by adopting privileged access management (PAM) and secure remote access capabilities.

Michael Saintcross

Michael Saintcross

U.S. Federal Team Leader

}

1:16 PM

 Women in Cybersecurity within the Federal Government: Bridging the Gender Gap

In the realm of rapidly advancing technological landscapes, the importance of cybersecurity has surged, driven by governments’ need to secure digital systems for enhanced efficiency and safety. However, a notable gender gap persists in this field, particularly within federal agencies. This panel explores the underrepresentation of women in federal cybersecurity roles, identifying barriers like gender bias and limited mentorship, with far-reaching impacts on team effectiveness, diversity, and national security.

Collaboration among government, academia, and the private sector is vital for nurturing a diverse pool of skilled professionals. By altering the narrative, showcasing female role models, and fostering inclusive workplaces, the gender gap can be bridged, ultimately bolstering national cybersecurity through equitable and diversified participation.

Katerina Megas

Katerina Megas

Program Manager, Cybersecurity for IoT, National Institute of Standards and Technology

Nicole Willis

Nicole Willis

Deputy Chief Information Officer, National Archives and Records Administration

Sarah Nur

Sarah Nur

Associate Chief Information Officer, Chief Information Security Officer, U.S. Department of Treasury

Lily Chen

Lily Chen

Mathematician, Group Leader, Cryptographic Technology Group, Computer Security Division, National Institute of Standards and Technology

Andrea Greene-Horace

Andrea Greene-Horace

Senior Advisor, Cybersecurity, Deputy Program Manager, Centers for Medicare and Medicaid Services, Center for Consumer Information and Insurance Oversight, U.S. Department of Health and Human Services

Alyssa Feola

Alyssa Feola

Cybersecurity Advisor Technology Transformation Services, Federal Acquisition Service, U.S. General Services Administration

Anita Brown

Anita Brown

Systems Engineering Manager, Federal Civilian, Palo Alto Networks

Moderator: Grace Dille

Moderator: Grace Dille

Senior Technology Reporter, Meritalk

}

2:05 PM

Emerging Technology Talk

Identity Driven Access in Zero Trust

Identities, whether people or non-person, are a large attack vector for any agency. Creating an identity-centric Zero Trust approach provides security while the other focuses of Zero Trust are deployed. Let’s discuss the standards and models needed for federal agencies to successfully approach identity for Zero Trust as the first priority.

Kelvin Brewer

Kelvin Brewer

Director of Public Sector Sales Engineering, Ping Identity

}

2:21 PM

Emerging Technology Talk

Our Federal Zero Trust Journey and The Path Ahead

Spurred by an Executive Order, federal agencies are investing heavily in a fundamental shift away from traditional defenses and towards a “zero trust” posture against cyber threats. Over the past three years, agencies have been provided a set of baseline goals from the Office of Management and Budget to achieve by the end of Fiscal Year (FY) 2024.

Mitch Herckis, who recently departed the White House Office of the Federal CIO, will provide insight into the progress that has been made by agencies to date, and what the road ahead could look like over the next year and beyond as agencies continue to gain maturity.

 Mitch Herckis

Mitch Herckis

Global Head of Government Affairs, Wiz

}

2:35 PM

Not Just a Technical Requirement: Embracing Zero Trust Culture

In a landscape where cyber threats transcend traditional boundaries, the concept of zero trust extends beyond federal agencies, emphasizing the need for a cultural shift towards security resilience. This panel will explore the broader implications of cultivating a zero trust mindset across organizations, irrespective of their sector. Beyond the technical nuances, it delves into the organizational philosophy necessary to embrace continuous vigilance and skepticism regarding internal and external entities. Zero trust, as a holistic approach, demands a fundamental shift in how organizations perceive trust, urging them to scrutinize every interaction and transaction.

In an era where interconnectedness and digital dependency expose organizations to multifaceted risks, cultivating a zero trust culture becomes paramount. This panel will discuss the needs and challenges of a paradigm shift, encouraging organizations to view cybersecurity not merely as a technical requirement but as an integral aspect of their identity, ensuring sustained adaptability and resilience in an ever-evolving threat landscape.

Wayne Rodgers

Wayne Rodgers

Zero Trust Lead, Office of the Chief Information Officer, U.S. Department of Education (Pending Agency Approval)

Amy Hamilton

Amy Hamilton

Senior Cybersecurity Advisor Policy and Programs, Office of Cybersecurity and CISO, Office of the Chief Information Officer, U.S. Department of Energy

Heather Kowalski

Heather Kowalski

Chief Information Officer, Interpol, U.S. Department of Justice

Christine Halvorsen

Christine Halvorsen

Federal Chief Technology Officer, Okta

John Curran

John Curran

Executive Editor, MeriTalk

View On Demand

By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy. By registering for this event you agree to receive event reminders via email, text, and/or phone call communications.

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Live. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.