Loading Events

ATARC's Federal Zero Trust Summit 2024

March 13, 2024, 7:30 AM - 3:00 PM ET | Marriott Marquis, Washington, D.C.

6.0 CPE Credits Available for this Event***

Register
}

7:30 AM

Registration   |    Breakfast

}

8:00 AM

Keynote Speaker

Gerald Caron

Gerald Caron

Chief Information Officer, International Trade Administration, United States Department of Commerce

}

8:55 AM

Fortifying Federal Cybersecurity: Harnessing Zero Trust Visibility and Analytics

In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to security breaches, limit potential damage, and ensure the integrity of critical government systems and data.

By establishing a holistic understanding of network dynamics and user interactions, agencies can make informed decisions, assess risks, and optimize cybersecurity measures. In a landscape characterized by evolving threats and complex attack vectors, leveraging advanced analytics to support zero trust principles equips federal government entities with a robust defense mechanism that safeguards national security and preserves public trust in the digital realm.

Elizabeth Phu

Elizabeth Phu

Principal Director, Cyber Policy, Office of the Assistant Secretary of Defense for Space Policy, U.S. Department of Defense (invited)

Conrad Bovell

Conrad Bovell

Branch Chief, Cybersecurity Advisory and Strategy, Office of Information Security, U.S. Department of Health and Human Services (invited)

David McKeown

David McKeown

Senior Information Security Officer, Deputy Chief Information Officer for Cybersecurity, U.S. Department of Defense (invited)

Kevin Greene

Kevin Greene

Chief Technology Officer, Public Sector, Open Text Cybersecurity

Jason Miller

Jason Miller

Executive Editor, Federal News Network (invited)

}

10:05 AM

Emerging Technology Talk

Zero Trust PDP Current and Future State

Zero Trust represents a transformative philosophy shifting away from static, policy-
driven access models like RBAC, towards a dynamic approach rooted in real-time risk
evaluation across the five foundational pillars of the environment. Within the Zero Trust
architecture, these risk assessments occur within the Policy Decision Point (PDP), often
referred to as the “trust engine.” This presentation delves into the current state of PDP
development and outlines the necessary steps for Zero Trust to evolve from concept to practical
reality.

Jean-Paul Bergeaux

Jean-Paul Bergeaux

Federal Chief Technology Officer, GuidePoint Security

}

10:25 AM

Elevating Federal Security: Enforcing Zero Trust Workforce Protection

Delve into the imperative of implementing zero trust workforce security within the federal government framework. As remote work and digital collaboration become integral to operations, traditional security models fall short. The panel will underscore how adopting a zero trust approach, which entails rigorous identity verification, continuous monitoring, and context-based access, is pivotal in safeguarding government systems and data.

By prioritizing workforce security through zero trust principles, federal agencies can mitigate insider threats, secure sensitive information, and ensure operational continuity, even in an era of evolving cybersecurity challenges.

Edam Colón

Edam Colón

Cybersecurity Specialist,Information Assurance and Cybersecurity Division, Transportation Security Administration, U.S. Department of Homeland Security

Ross Foard

Ross Foard

ICAM Subject Matter Expert, Continuous Diagnostics and Mitigation Program, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security (Pending Agency Approval)

Drew Malloy

Drew Malloy

Technical Director, Cyber Development Directorate, Defense Information Systems Agency

Tobias Naegele

Tobias Naegele

Editor in Chief, Air Force Magazine (invited)

}

11:15 AM

Lunch in the Emerging Technology Showcase

 

}

12:40 PM

Visionary Keynote Briefing

}

12:53 PM

Emerging Technology Talk

Bridging Zero Trust Principles to Identity Security Controls

Agencies are challenged with securing significantly more privileged accounts and supporting vastly larger remote, hybrid, and decentralized networks than in years past—many of them are not even considered traditional privileged accounts operated by administrators or system owners. Yet, almost every attack today requires privilege for the initial exploit or to laterally move within a network.

A zero trust architecture (ZTA) addresses modern privileged access security challenges by enforcing granular, secure, authorized access near the resources— whether located on-premises or in the cloud—for a remote workforce and vendors, based on an organization’s defined access policy.

In this session, we’ll share how your organization can extend privileged access security best practices beyond the perimeter by adopting privileged access management (PAM) and secure remote access capabilities.

Michael Saintcross

Michael Saintcross

U.S. Federal Team Leader

}

1:00 PM

 Women in Cybersecurity within the Federal Government: Bridging the Gender Gap

In the realm of rapidly advancing technological landscapes, the importance of cybersecurity has surged, driven by governments’ need to secure digital systems for enhanced efficiency and safety. However, a notable gender gap persists in this field, particularly within federal agencies. This panel explores the underrepresentation of women in federal cybersecurity roles, identifying barriers like gender bias and limited mentorship, with far-reaching impacts on team effectiveness, diversity, and national security.

Collaboration among government, academia, and the private sector is vital for nurturing a diverse pool of skilled professionals. By altering the narrative, showcasing female role models, and fostering inclusive workplaces, the gender gap can be bridged, ultimately bolstering national cybersecurity through equitable and diversified participation.

Heather Kowalski

Heather Kowalski

Chief Information Officer, Interpol, U.S. Department of Justice (Pending Agency Approval)

Nicole Willis

Nicole Willis

Deputy Chief Information Officer, National Archives and Records Administration

Sarah Nur

Sarah Nur

Associate Chief Information Officer, Chief Information Security Officer, U.S. Department of Treasury (Pending Agency Approval)

Lily Chen

Lily Chen

Mathematician, Group Leader, Cryptographic Technology Group, Computer Security Division, National Institute of Standards and Technology

Katerina Megas

Katerina Megas

Program Manager, Cybersecurity for IoT, National Institute of Standards and Technology

Alyssa Feola

Alyssa Feola

Cybersecurity Advisor Technology Transformation Services, Federal Acquisition Service, U.S. General Services Administration

Andrea Greene-Horace

Andrea Greene-Horace

Senior Advisor, Cybersecurity, Deputy Program Manager, Centers for Medicare and Medicaid Services, Center for Consumer Information and Insurance Oversight, U.S. Department of Health and Human Services

Theresa Kinney

Theresa Kinney

SEWP Senior Deputy Director/COR, Office of Procurement, National Aeronautics and Space Administration

Anita Brown

Anita Brown

Systems Engineering Manager, Federal Civilian, Palo Alto Networks

Moderator: Grace Dille

Moderator: Grace Dille

Senior Technology Reporter, Meritalk

}

2:15 PM

Not Just a Technical Requirement: Embracing Zero Trust Culture

In a landscape where cyber threats transcend traditional boundaries, the concept of zero trust extends beyond federal agencies, emphasizing the need for a cultural shift towards security resilience. This panel will explore the broader implications of cultivating a zero trust mindset across organizations, irrespective of their sector. Beyond the technical nuances, it delves into the organizational philosophy necessary to embrace continuous vigilance and skepticism regarding internal and external entities. Zero trust, as a holistic approach, demands a fundamental shift in how organizations perceive trust, urging them to scrutinize every interaction and transaction.

In an era where interconnectedness and digital dependency expose organizations to multifaceted risks, cultivating a zero trust culture becomes paramount. This panel will discuss the needs and challenges of a paradigm shift, encouraging organizations to view cybersecurity not merely as a technical requirement but as an integral aspect of their identity, ensuring sustained adaptability and resilience in an ever-evolving threat landscape.

Greg Hall

Greg Hall

Assistant Director & Chief Information Security Officer, Department of Justice

Amy Hamilton

Amy Hamilton

Senior Cybersecurity Advisor Policy and Programs, Office of Cybersecurity and CISO, Office of the Chief Information Officer, U.S. Department of Energy

Wayne Rodgers

Wayne Rodgers

Zero Trust Lead, Office of the Chief Information Officer, U.S. Department of Education

Dr. Sergey Bratus

Dr. Sergey Bratus

Program Manager, Information Innovation Office, Defense Advanced Research Projects Agency

Christine Halvorsen

Christine Halvorsen

Federal Chief Technology Officer, Okta

John Curran

John Curran

Executive Editor, MeriTalk (invited)

Register

By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy. By registering for this event you agree to receive event reminders via email, text, and/or phone call communications.

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Live. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.