CyberScape: Zero Trust

CyberScape: Zero Trust

 
 Zero Trust
Zero Trust
Event builder display intro
Washington, DC

Zero trust is sweeping across the government. Following the National Cyber Executive Order, leaders have made changes to implement new structures and systems to build the foundation for zero trust. Government leaders will address topics such as the new ICAM strategy and software-defined network access structure. CISOs and PCAs at the Defense Department and civilian agencies like HHS, NIST and the VA will discuss best practices and how this will impact future procurements.

Date
September 8, 2022
Time
8:00 - 10:00 AM ET
Where
Washington DC
Register Now
 
image of panelist

Agenda

 
-

Welcome Remarks

Amy Kluber, Editor-in-Chief, GovCIO Media & Research

-

Fireside Chat: Paving the Way to Zero Trust with Data

The White House Executive Order on Improving the Nation’s Cybersecurity highlighted the need for a new federal cybersecurity approach, but zero trust isn’t a one-size-fits-all solution. For many federal agencies, data quality, standards and governance determine their zero trust readiness. Learn how federal agencies can prepare for a zero trust architecture, starting with data.

-

Panel: ICAM Solutions

As federal agencies continue to develop zero trust architectures and frameworks, accurate and efficient user verification is a key piece to nail down. In environments like health care and law enforcement, speed of verification and layers of privacy protection are even more critical. We’ll talk with federal agencies grappling with these challenges in their mission work and how best practices in ICAM can help.
 

-

Panel: SBOMs and Software Security

Federal agencies adopting cloud solutions and integrating new software applications into their cloud-based IT infrastructure need new cyber strategies to secure the software-defined perimeter. The SBOM has emerged as a new way to identify and track potential vulnerabilities in the software supply chain. Hear from cloud and cyber leaders about how they’re using SBOMs and other techniques to secure software applications in the cloud.

-

Panel: Endpoint Security

Securing cloud user endpoints, such as desktops, laptops and mobile devices, is a major challenge for federal agencies as they move to the cloud and support a distributed workforce. Zero trust principles like ICAM solutions can help, but harmonizing endpoint security goals with mission needs requires flexibility and adaptability. This panel will draw insights on endpoint security in a remote, cloud-based work environment.

-

Closing Remarks

Amy Kluber, Editor-in-Chief, GovCIO Media & Research

Gold Sponsors

Fortinet Federal logo
 
Leidos logo
 
Rubrik Federal logo