ATARC's Federal Zero Trust Summit - Spring
March 13, 2024, 7:30 AM - 3:00 PM ET | Marriott Marquis, Washington, D.C.6.0 CPE Credits Available for this Event***
7:30 AM
Registration | Breakfast
8:35 AM
Keynote Speaker
Gerald Caron III
Chief Information Officer, International Trade Administration, United States Department of Commerce
8:50 AM
Fortifying Federal Cybersecurity: Harnessing Zero Trust Visibility and Analytics
In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to security breaches, limit potential damage, and ensure the integrity of critical government systems and data.
By establishing a holistic understanding of network dynamics and user interactions, agencies can make informed decisions, assess risks, and optimize cybersecurity measures. In a landscape characterized by evolving threats and complex attack vectors, leveraging advanced analytics to support zero trust principles equips federal government entities with a robust defense mechanism that safeguards national security and preserves public trust in the digital realm.
Karen Uttecht
Technical Staff, MIT Lincoln Laboratory
Rudolf Rojas
Information Technology Manager, U.S. Department of Agriculture
Dr. Daniel Corbin
Technical Director of the Command, Control, Communications, and Computers Division, Deputy Command for Information, U.S. Marine Corps
Shelly Hartsook
Deputy Associate Director for Capacity Building, Cybersecurity and Infrastucture Security Agency, U.S. Department of Homeland Security
Kevin Greene
Chief Technology Officer, Public Sector, Open Text Cybersecurity
David DiMolfetta
Cybersecurity Reporter, NextGov/FCW
9:35 AM
Special Presentation
Update on the Zero Trust Portfolio Management Office
Dr. Les Call
Director, CIO Zero Trust Portfolio Management Office, U.S. Department of Defense
10:05 AM
Emerging Technology Talk
Zero Trust PDP Current and Future State
Zero Trust represents a transformative philosophy shifting away from static, policy-
driven access models like RBAC, towards a dynamic approach rooted in real-time risk
evaluation across the five foundational pillars of the environment. Within the Zero Trust
architecture, these risk assessments occur within the Policy Decision Point (PDP), often
referred to as the “trust engine.” This presentation delves into the current state of PDP
development and outlines the necessary steps for Zero Trust to evolve from concept to practical
reality.
Jean-Paul Bergeaux
Federal Chief Technology Officer, GuidePoint Security
10:14 AM
Emerging Technology Talk
Beyond Compliance: Unlocking Agility and Innovation with Zero Trust
In the Federal Government, Zero Trust is often misperceived as a rigid set of
compliance mandates, stifling federal agencies' ability to innovate and meet evolving mission
needs. Let’s debunk the myth and discuss how a well-planned Zero Trust architecture can
become a powerful accelerator for government modernization. Attendees will explore how
Zero Trust principles streamline workflows, reduce operational friction, and create a secure
foundation for data-driven decision-making. The presentation will offer practical strategies for
overcoming implementation hurdles, fostering cultural buy-in, and leveraging Zero Trust to
boost both cybersecurity and federal workforce productivity.
Matt Topper
President, Uberether
10:25 AM
Elevating Federal Security: Enforcing Zero Trust Workforce Protection
Delve into the imperative of implementing zero trust workforce security within the federal government framework. As remote work and digital collaboration become integral to operations, traditional security models fall short. The panel will underscore how adopting a zero trust approach, which entails rigorous identity verification, continuous monitoring, and context-based access, is pivotal in safeguarding government systems and data.
By prioritizing workforce security through zero trust principles, federal agencies can mitigate insider threats, secure sensitive information, and ensure operational continuity, even in an era of evolving cybersecurity challenges.
Edam Colón
Cybersecurity Specialist,Information Assurance and Cybersecurity Division, Transportation Security Administration, U.S. Department of Homeland Security
Frank Indiviglio
Chief Technology Officer, National Oceanic and Atmospheric Administration, U.S. Department of Commerce
Eric Sanders
Chief Information Security Officer, Office of Intelligence and Analysis, U.S. Department of Homeland Security
Micah Maryn
Senior Solutions Engineer, Akamai
Justin Doubleday
Reporter, Federal News Network
11:35 AM
Lunch in the Emerging Technology Showcase
12:30 PM
Visionary Keynote Briefing
Dr. Tiina Rodrigue
Chief Information Security Officer, Consumer Financial Protection Bureau
1:00 PM
Emerging Technology Talk
Confidential Computing: Intrinsic Cloud Security to Lock Down Code and Data
What if your cloud infrastructure was intrinsically trustworthy? Join us for an insightful keynote
presentation exploring the pivotal role of Confidential Computing in advancing security
paradigms. We’ll unravel the essence of the next stage for zero trust architectures enabled by
impenetrable secure enclave technology. You will gain valuable insights into how public sector
organizations can leverage this cutting-edge technology to bolster defenses, foster trust, and
uphold the integrity of critical assets in an ever-evolving threat landscape.
Zach Sutton
Director of Public Sector, Anjuna
Dwayne Hoover
VP of Solutions Engineering, Anjuna
1:08 PM
Emerging Technology Talk
Bridging Zero Trust Principles to Identity Security Controls
Agencies are challenged with securing significantly more privileged accounts and supporting vastly larger remote, hybrid, and decentralized networks than in years past—many of them are not even considered traditional privileged accounts operated by administrators or system owners. Yet, almost every attack today requires privilege for the initial exploit or to laterally move within a network.
A zero trust architecture (ZTA) addresses modern privileged access security challenges by enforcing granular, secure, authorized access near the resources— whether located on-premises or in the cloud—for a remote workforce and vendors, based on an organization’s defined access policy.
In this session, we’ll share how your organization can extend privileged access security best practices beyond the perimeter by adopting privileged access management (PAM) and secure remote access capabilities.
Michael Saintcross
U.S. Federal Team Leader
1:16 PM
Women in Cybersecurity within the Federal Government: Bridging the Gender Gap
In the realm of rapidly advancing technological landscapes, the importance of cybersecurity has surged, driven by governments’ need to secure digital systems for enhanced efficiency and safety. However, a notable gender gap persists in this field, particularly within federal agencies. This panel explores the underrepresentation of women in federal cybersecurity roles, identifying barriers like gender bias and limited mentorship, with far-reaching impacts on team effectiveness, diversity, and national security.
Collaboration among government, academia, and the private sector is vital for nurturing a diverse pool of skilled professionals. By altering the narrative, showcasing female role models, and fostering inclusive workplaces, the gender gap can be bridged, ultimately bolstering national cybersecurity through equitable and diversified participation.
Katerina Megas
Program Manager, Cybersecurity for IoT, National Institute of Standards and Technology
Nicole Willis
Deputy Chief Information Officer, National Archives and Records Administration
Sarah Nur
Associate Chief Information Officer, Chief Information Security Officer, U.S. Department of Treasury
Lily Chen
Mathematician, Group Leader, Cryptographic Technology Group, Computer Security Division, National Institute of Standards and Technology
Andrea Greene-Horace
Senior Advisor, Cybersecurity, Deputy Program Manager, Centers for Medicare and Medicaid Services, Center for Consumer Information and Insurance Oversight, U.S. Department of Health and Human Services
Alyssa Feola
Cybersecurity Advisor Technology Transformation Services, Federal Acquisition Service, U.S. General Services Administration
Anita Brown
Systems Engineering Manager, Federal Civilian, Palo Alto Networks
Moderator: Grace Dille
Senior Technology Reporter, Meritalk
2:05 PM
Emerging Technology Talk
Identity Driven Access in Zero Trust
Identities, whether people or non-person, are a large attack vector for any agency. Creating an identity-centric Zero Trust approach provides security while the other focuses of Zero Trust are deployed. Let’s discuss the standards and models needed for federal agencies to successfully approach identity for Zero Trust as the first priority.
Kelvin Brewer
Director of Public Sector Sales Engineering, Ping Identity
2:21 PM
Emerging Technology Talk
Our Federal Zero Trust Journey and The Path Ahead
Spurred by an Executive Order, federal agencies are investing heavily in a fundamental shift away from traditional defenses and towards a “zero trust” posture against cyber threats. Over the past three years, agencies have been provided a set of baseline goals from the Office of Management and Budget to achieve by the end of Fiscal Year (FY) 2024.
Mitch Herckis, who recently departed the White House Office of the Federal CIO, will provide insight into the progress that has been made by agencies to date, and what the road ahead could look like over the next year and beyond as agencies continue to gain maturity.
Mitch Herckis
Global Head of Government Affairs, Wiz
2:35 PM
Not Just a Technical Requirement: Embracing Zero Trust Culture
In a landscape where cyber threats transcend traditional boundaries, the concept of zero trust extends beyond federal agencies, emphasizing the need for a cultural shift towards security resilience. This panel will explore the broader implications of cultivating a zero trust mindset across organizations, irrespective of their sector. Beyond the technical nuances, it delves into the organizational philosophy necessary to embrace continuous vigilance and skepticism regarding internal and external entities. Zero trust, as a holistic approach, demands a fundamental shift in how organizations perceive trust, urging them to scrutinize every interaction and transaction.
In an era where interconnectedness and digital dependency expose organizations to multifaceted risks, cultivating a zero trust culture becomes paramount. This panel will discuss the needs and challenges of a paradigm shift, encouraging organizations to view cybersecurity not merely as a technical requirement but as an integral aspect of their identity, ensuring sustained adaptability and resilience in an ever-evolving threat landscape.
Wayne Rodgers
Zero Trust Lead, Office of the Chief Information Officer, U.S. Department of Education (Pending Agency Approval)
Amy Hamilton
Senior Cybersecurity Advisor Policy and Programs, Office of Cybersecurity and CISO, Office of the Chief Information Officer, U.S. Department of Energy
Heather Kowalski
Chief Information Officer, Interpol, U.S. Department of Justice
Christine Halvorsen
Federal Chief Technology Officer, Okta
John Curran
Executive Editor, MeriTalk
View On Demand
By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy. By registering for this event you agree to receive event reminders via email, text, and/or phone call communications.
Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly.
*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org