Chris Cleary, Principal Cyber Advisor, Department of the Navy
Description
The U.S. Navy has continually worked to digitize the service branch’s work as well as develop its talent in the field. As the Navy continues to evolve to meet the growing demands, challenges still remain. Join the Navy's Principal Cyber Advisor, Christopher Cleary to examine issues like Zero Trust or Identity as it pertains to the Navy's partners inside the Department of Defense and out. He'll also highlight the role of the PCA and value of cyberesiliency in examining critical infrastructure, cyberoperations, warfighting functions, and cybercommand.
Dana Reed, Distinguished Engineer, Office of the Chief Technology Officer, SailPoint
Description
The identity and access (IAM) management market is experiencing a watershed moment in the wake of the global pandemic. The implementation of cloud, data analytics, and other digital initiatives have accelerated, but so too have cyber threats. IAM initiatives have risen in priority as organizations look to enable the digital business, while simultaneously tightening their belts on security. Join Mr. Dana Reed as he discusses the ever-evolving threat landscape and how it is shaping IAM business drivers. He will also discuss how regulations such as GDPR and CCPA and the recent Biden Administration’s Executive Order on Improving the Nation’s Cybersecurity are impacting the IAM market. Lastly, he will outline the top 5 IAM market trends for 2021-2022.
Frank Briguglio, Public Sector Strategist, SailPoint
Description
The need for the public sector to replace aging and expensive application servers is fueled by changing demographics, emerging technologies, and more recently by pandemic-driven workplace precarities. As the world continues to adapt to a post-pandemic era, organization leaders find themselves in a position to take advantage of the shifts in culture and technology to meet their needs, while simultaneously ensuring secure access to data and applications. During this session we'll discuss how organizations are boosting innovation in their workforce, securing organizational-wide digital transformation, and using emerging technologies to help them stay ahead of the curve.
Please take some time to visit our virtual Exhibit Hall
1:05pm
Editorial
Identity Management Organization of the Year
Greg McCarthy, Chief Information Security Officer, City of Boston, Massachusetts
George Jackson, Director of Events, GovExec
Description
The City of Boston recently initiated a complete transformation of its identity program to improve their security posture, end reliance on legacy systems, and solve user experience issues. During this session, we'll sit down with the City of Boston's Chief Information Security Officer, Greg McCarthy, to discuss how his department has gone above and beyond to protect employee, customer, and partner identities by applying innovative approaches to enhance user experience.
Mary Ann Blair, Chief Information Security Officer, Carnegie Mellon University
Dean Morstad, IAM Manager, Ramsey County
George Jackson, Director of Events, GovExec
Description
In the rush to get county staff up and running and productive, no matter where they work, many ultimately had more access than they needed. This increases the risk of cyber breaches and PII exposure. Join us to hear from state and local industry leaders about the risks associated with over-provisioning access, trends regarding cyber breaches, best practices for protecting personally identifiable information (PII), and more!
Following in the footsteps of a cyber-criminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker's techniques used and how they went from zero to full domain admin compromise that resulted in a nasty CryLock ransomware incident.
Sean Connelly, TIC Program Manager & Senior Cybersecurity Architect, Cybersecurity and Infrastructure Security Agency (CISA)
Description
Now more than ever, organizations are turning to a zero trust strategy to secure their data and systems. Regardless of size or sector, zero trust is essential to any organization operating in this new hybrid environment. Join Sean Connelly, program manager of Trusted Internet Connections (TIC) at the Cybersecurity and Infrastructure Security Agency (CISA), as he shares his considerations on the zero trust maturity model, Security Technical Reference Architecture (TRA), as well as other federal zero trust efforts.
Heather Gantt-Evans, Chief Information Security Officer, SailPoint
Description
Whether talking about identity-defined security architecture, threat detection and response, product and application security, data protection, or training and awareness – all of these cybersecurity disciplines require a strong identity foundation to be optimized and successful. Join Heather Gantt-Evans as she shares her experiences around how identity makes or breaks the success of a cybersecurity program.
Brandon Iske, Chief Engineer of Security Enablers, Defense Information Systems Agency (DISA)
John Pretz, Technical Director, Program Executive Office for Enterprise Information Systems (PEO EIS)
George Jackson, Director of Events, GovExec
Description
DoD agencies have relied on the legacy approach of collecting every piece of endpoint data, unable to take action in real-time. Now they’re turning to tools, policies, and systems – like ICAM and Zero Trust – to better secure endpoints across a globally distributed workforce. However, in today’s world where endpoints are so widely distributed outside of a traditional perimeter, there’s a need for a solution that both acts as a gatekeeper for transactions and collects data in real-time. How can agencies effectively bifurcate data instrumentation and collection while also allowing them the ability to appropriately interact with their endpoints data in real-time? This session will explore how agencies can interact with the data, at the endpoint, in real time in order to truly leverage Zero Trust.
Please take some time to visit our virtual Exhibit Hall
12:40pm
Editorial
Secure Communication for Sensitive Data
Gregory Williams, Director of Security, Risk, and Compliance, Governor's Office of Information Technology, State of Colorado
Rita Reynolds, Chief Technology Officer, National Association of Counties
George Jackson, Director of Events, GovExec
Description
Technology is constantly evolving, making it easier for unauthorized users - like hackers - to get into your system. As visibility for compliance and control gains importance, the cloud needs to grant the right kind of access to the right person at the right time. In this session, you'll hear from leaders on data security best practices as well as tips on how to effectively tackle security modernization in this hybrid environment.
Matt Topper, President & Solutions Catalyst, UberEther
Description
Identity Security is the foundation for Zero Trust. This statement has been widely accepted within the cyber-security industry since most breaches result from weak credentials and unmanaged accounts. However, identity is more than just the card you put into your computer every morning. Identity is the foundation by which you assert your relationship with an organization. How you justify the applications and data, you should be allowed to access and what you can do with it. We will discuss why Identity Security is decidedly the foundation for Zero Trust, how it enables the other Zero Trust pillars, and how to set the foundation for your entire Zero Trust journey.
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?
During this discussion, Public Sector thought leader, Josh Brodbent, will discuss how to manage identity to ensure agencies are aligned with recent policies such as Biden’s Executive Order on Cybersecurity and the NIST 800-207 Zero Trust Architecture.
Adam Ford, Chief Information Security Officer, State of Illinois
Description
Identity and Access Management (IAM) are becoming the cornerstone of every agency's cybersecurity program. IAM ensures that the right people gain access to the right resources at the right time, for the right reasons. A successful program allows teams to reduce risk, strengthen organizational security, improve compliance and reduce operational costs. So it may seem obvious that the implementation of IAM in your organization needs to take place, but now you wonder how? Join Adam Ford, Chief Information Security Officer for the State of Illinois, as he discusses how to build an efficient and secure identity program.
As cyber incidents become increasingly sophisticated and complex, the Biden administration has stepped up its initiatives to ensure the effective implementation of cybersecurity and privacy in both public and private sectors. One of these measures includes the recently signed Executive Order on Improving the Nation’s Cybersecurity. Join Sailpoint as they look at what’s required of agencies by the Executive Order and the best approaches and the challenges agencies face.
In the wake of the COVID-19 pandemic, many common transactions that require identification are now being carried out digitally. As these interactions continue, citizens expect access to a secure and private digital identity framework. Industry leaders have focused a lot of effort and resources on their comprehensive approaches to identity security to ensure that the entire process is sound, but what are the benefits? During this session, hear from such leaders on the benefits their organizations have realized when applying comprehensive identity approaches to network access. We'll examine what steps they took in developing their approach, as well as provide perspectives on what outcomes can be expected.
Lisa Lorenzin, Senior Director of Transformation Strategy, Zscaler
Bryan Rosensteel, Federal Solutions Architect, Ping Identity
Frank Briguglio, Public Sector Strategist, SailPoint
Description
The proliferation of cloud computing has dissolved conventional network boundaries. The workforce is more distributed, with remote workers who need access to resources anytime, anywhere, and on any device, to support the mission. In comes Zero Trust, and the NIST Cybersecurity Center of Excellence (NCCOE) and the Zero Trust Implementation project.
A number of vendors, Sailpoint included, are working with the NCCoE to build a modular, end-to-end example ZTA(s) using commercially available technology that will address a set of cybersecurity challenges aligned to the NIST Cybersecurity Framework. In this session, you'll hear from SailPoint and its identity partners Ping, Radiant Logic and Zscaler involved in the project during this session. We will explore ZTA, project status, and how your agency can get started.
Using the Audit Process to Better Protect High Value Assets
Jennifer Franks, Director of Information Technology and Cybersecurity team, Government Accountability Office
George Jackson, Director of Events, GovExec
Description
Every organization has mission-critical information and technology assets that require enhanced security. Throughout the federal government, agencies operate High Value Assets (HVA), which contain sensitive information or support critical agency services. Beyond their monetary value, organizations must consider the impact of HVAs on cross-functional processes. As such, understanding and managing HVAs has become an essential component of senior security leaders' risk management programs. During this session, you will hear from leaders about the importance of the ability to identify and protect HVAs, which plays a critical role in allowing them to allocate resources to ensure the greatest protection and resilience of the data, processes and systems that matter most to the organization. (Note: CISA released guidance on how HVAs should be managed. We could work that into the Q&A)
The future of delivering citizen services (e.g., driver’s license numbers, property data, health-related benefits, unemployment eligibility, and broader social benefits) relies heavily on digital infrastructure capable of providing citizens secure access to Government services online. Enabling a single digital identity to access Government services can simplify the user experience. However, many Government entities continue to struggle integrating and governing access between their new cloud infrastructure and legacy systems, thus proliferating technology debt and complexity.During this session, Deloitte will share its Citizen Identity Component Taxonomy and explain how Government entities can utilize SailPoint to integrate, enable, and govern their citizen services in the future. Deloitte will close the session by facilitating a panel of industry specialists and implementers who are shaping how citizen identity enables the digitization of Government services online
Credential Management is critical to secure all systems and information. Whether a PIV, YubiKey, Mobile or other MFA/2FA solution, credential issuance requires governance and control to ensure the right level of credential is issued to the right person, that is suitable for access; this is where Identity Governance comes in. During this session, SailPoint and Intercede will discuss and demonstrate credential issuance and identity governance together; highlighting how bringing together the two platforms creates a seamless, frictionless experience from the credential request through issuance.