Agenda
Times are subject to change.
8:30 AM EDT
Wednesday, March 16
Welcome
Troy K. Schneider, President, GovExec 360
Welcome and Opening Remarks by Troy Schneider, President, GovExec 360
8:35 AM EDT
Wednesday, March 16
Putting the Cyber EO into Action
Chris DeRusha, Federal Chief Information Security Officer and Deputy National Cyber Director for Federal Cybersecurity, Office of Management and Budget
Session Opening Remarks: Allen Whipple, NA Server Management and Server Security Solution Business Manager, Hewlett Packard Enterprise
Hear from Chris DeRusha of Office of Management and Budget at Cybersecurity Summit.
Sponsored by: Hewlett Packard Enterprise
On Demand
9:00 AM EDT
Wednesday, March 16
Zero Trust: Beyond the Buzzword
Gina Scinta, Deputy Chief Technology Officer, Thales TCT
Zero Trust is not just another buzzword in a never-ending list of tech trends. The principles of zero trust eliminates the binary trust/don't trust approach applied to users and assets in yesterday's on-premises, perimeter-centric environments.
The White House has issued guidance including the Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems and Executive Order 14028 which require agencies to develop a plan to implement a Zero Trust Architecture.
This session covered the best practices for implementing a zero trust architecture to protect your most sensitive data.
Sponsored by: Thales TCT
On Demand
9:20 AM EDT
Wednesday, March 16
Managing Access to Mitigate Risk
Josh Brodbent, RVP, Public Sector Solutions Engineering, BeyondTrust
Steven Hernandez, Chief Information Security Officer, U.S. Department of Education
Beau Houser, Chief Information Security Officer, U.S. Census Bureau
Moderator: Adam Mazmanian, Executive Editor, FCW
This panel discussed some of the budgetary, contracting and policy challenges facing federal CISOs in the implementation of modernized identity management tools and practices.
Sponsored by: BeyondTrust
On Demand
10:00 AM EDT
Wednesday, March 16
Securing Hybrid Clouds
James Mandelbaum, Field CTO, Gigamon
Paul B. Puckett III, Director, Enterprise Cloud Management Office, U.S. Army
Moderator: Anne Armstrong, VP, Strategic Alliances, GovExec
This session will discuss why securing hybrid clouds is challenging, what the points of vulnerability are and how shared responsibility between the agency and the cloud providers is key. It will also offer some lessons learned to guide agencies in their efforts.
Sponsored by: Gigamon
On Demand
10:30 AM EDT
Wednesday, March 16
COFFEE BREAK
A chance to stretch your legs and refill your coffee!
10:40 AM EDT
Wednesday, March 16
Defending and Remediating log4Shell Attacks
Kwadwo Burgee, Senior Vulnerability Analyst, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security
This session will discussed the very dangerous log4Shell vulnerability that puts many systems at risk and how working with 3rd party vendors through CISA partnerships can help with the remediation.
On Demand
11:10 AM EDT
Wednesday, March 16
Becoming Secure by Design: Questions You Should Ask Your Software Vendors
Tim Brown, CISO and Vice President, Security, SolarWinds
Sponsored by: SolarWinds
On Demand
11:30 AM EDT
Wednesday, March 16
Security as a Service: How much can Agencies Outsource?
Jim Richberg, Field Chief Information Security Office, Fortinet
Robert Wood, Chief Information Security Officer, Centers for Medicare & Medicaid Services
Moderator: Chris Riotta, Staff Writer, FCW
Security as a Service solutions are becoming increasingly popular methods to outsource cybersecurity services while scaling security, reducing costs and easing the pressure on in-house security teams. This panel explored how agencies are incorporating Security as a Service solutions and using zero trust as a roadmap to understand what can be outsourced within specific organizations.
Sponsored by: Fortinet Federal
On Demand
12:00 PM EDT
Wednesday, March 16
COFFEE BREAK
A chance to stretch your legs and refill your coffee!
12:15 PM EDT
Wednesday, March 16
Empowering Federal Agencies with a Secure Journey to the Cloud
Vishal Amin, Director, Microsoft Federal Security Solutions
As Security, Compliance, Identity and Management continue to be paramount (or focal points) in the way our Federal Government innovates and moves to the cloud, Microsoft is committed to supporting and empowering agencies digital transformation efforts by delivering best of breed security across all devices, platforms and endpoints. It is critical that agencies are enabled to rapidly assess and improve their security posture and with the advancement in vulnerability management to endpoint data loss prevention and partnerships within the growing third party ecosystem Microsoft’s commitment is shown through their investments across the platform. During this session, attendees learned about where Microsoft is headed, where it’s investments are being made and how all these pieces work together to ensure a secure and seamless cloud journey for federal agencies.
Sponsored by: Microsoft Federal Solutions
On Demand
12:35 PM EDT
Wednesday, March 16
Complex Networks: A Challenge to Threat Visibility
Gerald J. Caron III, Chief Information Officer/Assistant Inspector General of Information Technology, Office of Inspector General, U.S Department of Health and Human Services
Chris Jensen, Public Sector Business Development Manager, Tenable
Moderator: Adam Mazmanian, Executive Editor, FCW
Efforts to apply recent cybersecurity policy demands across federal networks is complicated by the rise of telework and the proliferation of devices and cloud-based applications. In this discussion, two experts looked at how to prioritize and manage efforts to minimize the attack surface.
Sponsored by: Tenable
On Demand
1:15 PM EDT
Wednesday, March 16
Automating Threat Detection
Daniel Bardenstein, Tech and Cyber Strategy Lead, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security
Chris Usserman, Director of Security Architecture, Infoblox
Moderator: Troy Schneider, President, GovExec 360
In this session, Daniel Bardenstein and Chris Usserman discussed the steps CISA is taking to strengthen its own threat detection toolkit, automation's implications for the security workforce, and newer solutions that government should be considering for future use.
Sponsored by: Infoblox
On Demand
1:45 PM EDT
Wednesday, March 16
Federal Agencies and Automating Zero Trust
Drew Church, Global Security Strategist, Splunk
Federal agencies are no strangers to mandates and new IT security requirements; Zero Trust is no exception. One common thread from executives and security leaders is "how can I make this new technology all do something for my organization and my teams?" Attendees tuned in to hear how agencies embarking on a zero trust journey can use Security Orchestration Automation and Response (SOAR) to achieve the promised outcomes of Zero Trust.
Sponsored by: Splunk
On Demand
2:05 PM EDT
Wednesday, March 16
Public-Private Partnerships to Combat Cyber Threats in the U.S. Energy Sector
Puesh M. Kumar, Director, Office of Cybersecurity, Energy Security, and Emergency Response, Department of Energy
Session Opening Remarks: Grayson Lenik, Director, Consulting and Professional Services, Trustwave Government Solutions
Hear from Puesh Kumar of Department of Energy at Cybersecurity Summit.
On Demand
2:35 PM EDT
Wednesday, March 16
Thank You
Troy K. Schneider, President, GovExec 360
Thank you for joining us!