Complex Networks: A Challenge to Threat Visibility
Efforts to apply recent cybersecurity policy demands across federal networks is complicated by the rise of telework and the proliferation of devices and cloud-based applications. In this discussion, two experts looked at how to prioritize and manage efforts to minimize the attack surface.
Sponsored by: Tenable
Speakers
Chris Jensen, Public Sector Business Development Manager, Tenable
Adam Mazmanian, Executive Editor, FCW
More On Demand
March 16, 2022
Zero Trust: Beyond the Buzzword
Zero Trust is not just another buzzword in a never-ending list of tech trends. The principles of zero trust eliminates the binary trust/don't trust approach applied to users and assets in yesterday's on-premises, perimeter-centric environments.
The White House has issued guidance including the Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems and Executive Order 14028 which require agencies to develop a plan to implement a Zero Trust Architecture.
This session covered the best practices for implementing a zero trust architecture to protect your most sensitive data.
Sponsored by: Thales TCT
Securing Hybrid Clouds
This session will discuss why securing hybrid clouds is challenging, what the points of vulnerability are and how shared responsibility between the agency and the cloud providers is key. It will also offer some lessons learned to guide agencies in their efforts.
Sponsored by: Gigamon
Defending and Remediating log4Shell Attacks
This session will discussed the very dangerous log4Shell vulnerability that puts many systems at risk and how working with 3rd party vendors through CISA partnerships can help with the remediation.
Becoming Secure by Design: Questions You Should Ask Your Software Vendors
Sponsored by: SolarWinds
Security as a Service: How much can Agencies Outsource?
Security as a Service solutions are becoming increasingly popular methods to outsource cybersecurity services while scaling security, reducing costs and easing the pressure on in-house security teams. This panel explored how agencies are incorporating Security as a Service solutions and using zero trust as a roadmap to understand what can be outsourced within specific organizations.
Sponsored by: Fortinet Federal
Empowering Federal Agencies with a Secure Journey to the Cloud
As Security, Compliance, Identity and Management continue to be paramount (or focal points) in the way our Federal Government innovates and moves to the cloud, Microsoft is committed to supporting and empowering agencies digital transformation efforts by delivering best of breed security across all devices, platforms and endpoints. It is critical that agencies are enabled to rapidly assess and improve their security posture and with the advancement in vulnerability management to endpoint data loss prevention and partnerships within the growing third party ecosystem Microsoft’s commitment is shown through their investments across the platform. During this session, attendees learned about where Microsoft is headed, where it’s investments are being made and how all these pieces work together to ensure a secure and seamless cloud journey for federal agencies.
Sponsored by: Microsoft Federal Solutions
Complex Networks: A Challenge to Threat Visibility
Efforts to apply recent cybersecurity policy demands across federal networks is complicated by the rise of telework and the proliferation of devices and cloud-based applications. In this discussion, two experts looked at how to prioritize and manage efforts to minimize the attack surface.
Sponsored by: Tenable
Automating Threat Detection
In this session, Daniel Bardenstein and Chris Usserman discussed the steps CISA is taking to strengthen its own threat detection toolkit, automation's implications for the security workforce, and newer solutions that government should be considering for future use.
Sponsored by: Infoblox
Federal Agencies and Automating Zero Trust
Federal agencies are no strangers to mandates and new IT security requirements; Zero Trust is no exception. One common thread from executives and security leaders is "how can I make this new technology all do something for my organization and my teams?" Attendees tuned in to hear how agencies embarking on a zero trust journey can use Security Orchestration Automation and Response (SOAR) to achieve the promised outcomes of Zero Trust.
Sponsored by: Splunk