Skip to Main Content

CyberScape: Zero Trust Breakfast

Event Date:
Time:
Location:
Archer Hotel, Tysons

Zero trust is sweeping across government. Following the May 2021 White House Executive Order on Improving the Nation’s Cybersecurity, IT leaders are implementing new structures and systems to build the foundation for zero trust. Government leaders will address topics such as ICAM strategy and software-defined network access structure. Tech-minded leaders from defense and civilian agencies discuss best practices and how this will impact future procurements and their missions.

CyberScape Zero Trust Breakfast 2022
Agenda

Speakers / Panelists

Speakers / Panelists

  • Mike Hoffman
    Michael Hoffman President GovCIO Media & Research

The White House Executive Order on Improving the Nation’s Cybersecurity highlighted the need for a new federal cybersecurity approach, but zero trust isn’t a one-size-fits-all solution. For many federal agencies, data quality, standards and governance determine their zero trust readiness. Learn how federal agencies can prepare for a zero trust architecture, starting with data.

Speakers / Panelists

  • Jay Gazlay
    Jay Gazlay Associate Director for Vulnerability Management, Cybersecurity Division CISA
  • Kate Macri
    Moderator Kate Macri Deputy Editor GovCIO Media & Research

Speakers / Panelists

  • Sterling Wilson
    Sterling Wilson National Alliances Leader, Data Security and Management Rubrik Federal

As federal agencies continue to develop zero trust architectures and frameworks, accurate and efficient user verification is a key piece to nail down. In environments like health care and law enforcement, speed of verification and layers of privacy protection are even more critical. We’ll talk with federal agencies grappling with these challenges in their mission work and how best practices in ICAM can help.

Speakers / Panelists

  • Filipe Fernandez
    Felipe Fernandez Director, Systems Engineering Fortinet Federal
  • Kenneth Myers Director, Identity Assurance and Trusted Access Division, GSA
    Kenneth Myers Director, Identity Assurance and Trusted Access Division, GSA
  • Sarah Sybert
    Sarah Sybert Senior Staff Writer/Researcher GovCIO Media & Research

Speakers / Panelists

Federal agencies adopting cloud solutions and integrating new software applications into their cloud-based IT infrastructure need new cyber strategies to secure the software-defined perimeter. The SBOM has emerged as a new way to identify and track potential vulnerabilities in the software supply chain. Hear from cloud and cyber leaders about how they’re using SBOMs and other techniques to secure software applications in the cloud.

Speakers / Panelists

  • headshot of Natalia Martin, Acting Director, National Cybersecurity Center of Excellence, NIST
    Natalia Martin Acting Director, National Cybersecurity Center of Excellence NIST
  • Phil Stupak
    Phil Stupak Director of Federal Cybersecurity Office of the National Cyber Director
  • Nicole Thompson
    Nicole Thompson Digital Services Expert Defense Digital Service
  • Adam Patterson
    Adam Patterson Staff Writer/Researcher GovCIO Media & Research

Speakers / Panelists

  • Mike Epley Chief Architect and Security Strategist, Public Sector, Red Hat
    Michael Epley Chief Architect and Security Strategist Red Hat

Securing cloud user endpoints, such as desktops, laptops and mobile devices, is a major challenge for federal agencies as they move to the cloud and support a distributed workforce. Zero trust principles like ICAM solutions can help, but harmonizing endpoint security goals with mission needs requires flexibility and adaptability. This panel will draw insights on endpoint security in a remote, cloud-based work environment.

Speakers / Panelists

  • Gerald Caron
    Gerald Caron CIO, Office of the Inspector General HHS
  • Drew Malloy
    Drew Malloy Technical Director, Cyber Development Directorate DISA
  • Jesse Peoples Chief Security Architect, Leidos
    Jesse Peoples Chief Security Architect Leidos
  • Don Watson CISO, USPTO
    Don Watson CISO USPTO
  • Katherine MacPhail
    Katherine MacPhail Staff Writer/Researcher GovCIO Media & Research
Speakers
  • Gerald Caron
    Gerald Caron CIO, Office of the Inspector General, HHS
  • Kurt DelBene
    Kurt DelBene Assistant Secretary for Information and Technology and CIO, VA
  • Mike Epley Chief Architect and Security Strategist, Public Sector, Red Hat
    Michael Epley Chief Architect and Security Strategist, Public Sector, Red Hat
  • Filipe Fernandez
    Felipe Fernandez CTO, Fortinet Federal
  • Jay Gazlay
    Jay Gazlay Associate Director for Vulnerability Management, Cybersecurity Division, CISA
  • Amy Kluber
    Amy Kluber Editor-in-Chief, GovCIO Media & Research
  • Katherine MacPhail
    Katherine MacPhail Staff Writer/Researcher, GovCIO Media & Research
  • Kate Macri
    Kate Macri Deputy Editor, GovCIO Media & Research
  • Drew Malloy
    Drew Malloy Technical Director, Cybersecurity and Analytics Directorate, DISA
  • headshot of Natalia Martin, Acting Director, National Cybersecurity Center of Excellence, NIST
    Natalia Martin Acting Director, National Cybersecurity Center of Excellence, NIST
  • Kenneth Myers Director, Identity Assurance and Trusted Access Division, GSA
    Kenneth Myers Director, Identity Assurance and Trusted Access Division, GSA
  • Adam Patterson
    Adam Patterson Staff Writer/Researcher, GovCIO Media & Research
  • Jesse Peoples Chief Security Architect, Leidos
    Jesse Peoples Chief Security Architect,, Leidos
  • Phil Stupak
    Phil Stupak Director of Federal Cybersecurity, Office of the National Cyber Director
  • Sarah Sybert
    Sarah Sybert Senior Staff Writer/Researcher,, GovCIO Media & Research
  • Nicole Thompson
    Nicole Thompson Digital Services Expert, Defense Digital Service
  • Don Watson CISO, USPTO
    Don Watson CISO, USPTO
  • Sterling Wilson
    Sterling Wilson National Alliances Leader, Data Security and Management, Rubrik Federal
Sponsors
Gold Sponsors
Silver Sponsor

Become a Sponsor

Connecting Industry Professionals with Federal C-Suite Executives at the right time, in the right place.

Advertise With Us